1

Click here to load reader

Malware in penetration testing 4

Embed Size (px)

DESCRIPTION

Here is more info about different kind of malware like spyware, adware and Hijacker

Citation preview

Page 1: Malware in penetration testing 4

isoeh.com https://www.isoeh.com/tutorialdetails/MTkw/malware-in-penetration-testing

MALWARE IN PENETRATION TESTING

MALWARE IN PENETRATION TESTING 4(#ISOEH) © ISOEH 2014

for more tutorials visit https://www.isoeh.com/tutorial.php

->SPYWARE

Spyware operated on 2 different attack strategies.

~First collects the online activities (visited websites, subscriptions toservices, shopping, etc.)

~In addition to the user's online habits, the spyware, collect alsopasswords, numbers of credit cards, and other sensitive information,generally helped by a keyloggers

In both cases, this software is not capable of self-propagating to install and require no userintervention.

->ADWARE

Softwares supported by advertising and indicates those programs that use them during the show advertisementsallowing the free distribution or otherwise at reduced prices.

These software do not fall into the category of malware if it were not which often implement some of thecharacteristics of spyware in order to present the user with advertisements focused on its interests.

->HIJACKER

This software is able to change the homepage of the browser with the purpose of directing it on pages thatcontain other types of malware that can spread through browser using existing bugs.