wrapper is used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
b7510226800hat Zitat gemachtvor 4 Jahren
crypter is a software tool that uses a combination of encryption and code manipulation to render malware undetectable to AV and other security monitoring products
b7510226800hat Zitat gemachtvor 4 Jahren
session splicing is an IDS evasion method.
b7510226800hat Zitat gemachtvor 4 Jahren
Spyware is type of malware that covertly collects information about a user.
b7510226800hat Zitat gemachtvor 4 Jahren
virus is a malicious computer program with self-replication capabilities that attaches to another file and moves with the host from one computer to another.
b7510226800hat Zitat gemachtvor 4 Jahren
worm is a self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
b7510226800hat Zitat gemachtvor 4 Jahren
Trojan is a non-self-replicating
b7510226800hat Zitat gemachtvor 4 Jahren
Aircrack is “an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack
b7510226800hat Zitat gemachtvor 4 Jahren
Remember that the initialization vectors within WEP are relatively short (24 bits) and are reused frequently, so any attempt to crack the code requires, in general, around 15,000 or so packets.
b7510226800hat Zitat gemachtvor 4 Jahren
Pivoting does refer to connecting to other machines from a compromised system, but is not accomplished with a pivot command.