Upload
arbab-usmani
View
33
Download
1
Embed Size (px)
DESCRIPTION
In order to propagate over the network and infect local data, the malware generally exploit a weakness or vulnerabilities on the target system, here is little information about their types
Citation preview
isoeh.com https://www.isoeh.com/tutorialdetails/MTg4/malware-in-penetration-testing-2
MALWARE IN PENETRATION TESTING 2
MALWARE IN PENETRATION TESTING 2 (#ISOEH) © ISOEH 2014
for more tutorials visit https://www.isoeh.com/tutorial.php
In order to propagate over the network and infect local data, the malwaregenerally exploit a weakness or vulnerabilities on the target system:
Non-expert users
Vulnerable Software and operating system
Weak Network infrastructure
Inadequate security measures (lack of protection)
Types of Malware :
->VIRUS
The virus is the most typical malicious code available on the market and is consistently the most developed by thecode writers.
After being "reproductive", the viruses start to do a variety of activities, destructive and/or obstruction.
Typical examples such as a Virus that can infect the MBR (Master Boot Record) if installed on the first sector ofthe Hard Disk (called the boot sector), that contains machine code to be loaded into random-access memory(RAM) by a computer system's built-in firmware. This may destroy the entire logical partition and prevent the computer from boot up correctly.
->WORM
In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and donot require a host program or human help to propagate. Generally the Worm infects the computer usingvulnerabilities present in the system.
by- Samrat Das www.facebook.com/dkdmd18