In this series I’m going to do some pentesting, hacking lab challenges and ctfs. This video is just for fun and educational purpose, you should never hack a website. You should give it a shot, too. If you want to catch up on some security fundamentals I recommend you to check out my website https://tech-brew.net/.
The last article covered some malware that you should know for the CompTIA Security+ exam. In this article I will explain a few more.
If you missed the first article about malware, catch up here.
Malware that executes when a certain event occurs is called a logic bomb. They’re usually programs or code snippets.
The bomb may inform an attacker when his victim is connected to the internet and uses a specific program.
Not malware per se.
Originally the term was used for troubleshooting and developer hooks in software or systems. They were implemented for maintenance and testing.
Usually after done with testing and maintenance the backdoors are removed, before release, but sometimes one is forgotten and this poses a vulnerability.
The “new” term refers to a program/utility inserted by an intruder, that creates an “easy entrance” for him.
Malware running on infected comupters is often known as botnet.
Bots run automatically and are some kind of simple AI.
Bot-nets are similar: A bot-herder (the attacker) uses the botnet he controlls to launch DDos, adware, spyware, spambots and various other malicious stuff.
Ransomware is often delivered through a trojan. The malware then takes controll of the system and “kidnaps” it, by encrypting the hard drives, changing passwords and other creative ways.
It then demands, that a third party is paid.
If you liked this post, leave a comment. You can also let me know if you didn’t like it 😛
In this series I’m going to do some pentesting, hacking lab challenges and ctfs. This video is just for fun and educational purpose, you should never hack a website. You should give it a shot, too. If you want to catch up on some security fundamentals I recommend you to check out my CompTIA Security+ Section.
Malware is software used to gain access to data using weaknesses and exploit it. A brief introduction to software exploitation.
So recently I checked my stats of the blog and mailing list and I must say that it has improved over the last couple months.
All I wanted to do now is say thank you to all the “fans” :P.
So thank you very much and stay tuned. I’m a bit busy at the moment, because I just started working and studying at the same time and need to get into it untill I can keep up with weekly blogs.
Hope you guys enjoy!