1
isoeh.com https://www.isoeh.com/tutorialdetails/MTg4/malware-in-penetration-testing-2 MALWARE IN PENETRATION TESTING 2 MALWARE IN PENETRATION TESTING 2 (#ISOEH) © ISOEH 2014 for more tutorials visit https://www.isoeh.com/tutorial.php In order to propagate over the network and infect local data, the malware generally exploit a weakness or vulnerabilities on the target system: Non-expert users Vulnerable Software and operating system Weak Network infrastructure Inadequate security measures (lack of protection) Types of Malware : ->VIRUS The virus is the most typical malicious code available on the market and is consistently the most developed by the code writers. After being "reproductive", the viruses start to do a variety of activities, destructive and/or obstruction. Typical examples such as a Virus that can infect the MBR (Master Boot Record) if installed on the first sector of the Hard Disk (called the boot sector), that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware. This may destroy the entire logical partition and prevent the computer from boot up correctly. ->WORM In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. Generally the Worm infects the computer using vulnerabilities present in the system. by- Samrat Das www.facebook.com/dkdmd18

Malware in penetration testing 2

Embed Size (px)

DESCRIPTION

In order to propagate over the network and infect local data, the malware generally exploit a weakness or vulnerabilities on the target system, here is little information about their types

Citation preview

Page 1: Malware in penetration testing 2

isoeh.com https://www.isoeh.com/tutorialdetails/MTg4/malware-in-penetration-testing-2

MALWARE IN PENETRATION TESTING 2

MALWARE IN PENETRATION TESTING 2 (#ISOEH) © ISOEH 2014

for more tutorials visit https://www.isoeh.com/tutorial.php

In order to propagate over the network and infect local data, the malwaregenerally exploit a weakness or vulnerabilities on the target system:

Non-expert users

Vulnerable Software and operating system

Weak Network infrastructure

Inadequate security measures (lack of protection)

Types of Malware :

->VIRUS

The virus is the most typical malicious code available on the market and is consistently the most developed by thecode writers.

After being "reproductive", the viruses start to do a variety of activities, destructive and/or obstruction.

Typical examples such as a Virus that can infect the MBR (Master Boot Record) if installed on the first sector ofthe Hard Disk (called the boot sector), that contains machine code to be loaded into random-access memory(RAM) by a computer system's built-in firmware. This may destroy the entire logical partition and prevent the computer from boot up correctly.

->WORM

In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and donot require a host program or human help to propagate. Generally the Worm infects the computer usingvulnerabilities present in the system.

by- Samrat Das www.facebook.com/dkdmd18