This article will give you 5 tipps on how to become a hacker. Focusing on becoming a white hat hacker also known as Penetration tester. Continue reading “How To Become A Hacker – 5 Tipps”
Every software out there has vulnerabilities to exploit. Application attacks try to use the bugs created by developers to gain access to systems & more.
Attackers have various reasons for initiating an attack. Your goal ist to keep the people in your network safe. No matter the motive of the attacker.
The last article covered some malware that you should know for the CompTIA Security+ exam. In this article I will explain a few more.
If you missed the first article about malware, catch up here.
Malware that executes when a certain event occurs is called a logic bomb. They’re usually programs or code snippets.
The bomb may inform an attacker when his victim is connected to the internet and uses a specific program.
Not malware per se.
Originally the term was used for troubleshooting and developer hooks in software or systems. They were implemented for maintenance and testing.
Usually after done with testing and maintenance the backdoors are removed, before release, but sometimes one is forgotten and this poses a vulnerability.
The “new” term refers to a program/utility inserted by an intruder, that creates an “easy entrance” for him.
Malware running on infected comupters is often known as botnet.
Bots run automatically and are some kind of simple AI.
Bot-nets are similar: A bot-herder (the attacker) uses the botnet he controlls to launch DDos, adware, spyware, spambots and various other malicious stuff.
Ransomware is often delivered through a trojan. The malware then takes controll of the system and “kidnaps” it, by encrypting the hard drives, changing passwords and other creative ways.
It then demands, that a third party is paid.
If you liked this post, leave a comment. You can also let me know if you didn’t like it 😛