Please enable JavaScript.
Coggle requires JavaScript to display documents.
CAP 21 - Malicious code and application attacks (Password attacks…
CAP 21 - Malicious code and application attacks
Malicious code
sources (script kiddie, APT)
Viruses
virus propagation techniques
MBR
file infector (exe)
macro viruses
service injection
antivirus mechanism (signature based detection + heuristic)
virus technologies
multipartite viruses
stealth viruses
polimorphic viruses
encrypted viruses
logic bombs
trojan horses
worms (code red, stuxnet)
spyware and adware
zero-day attacks (window of vulnerability)
Password attacks
password guessing
dictionary attack (rainbow tables)
social engineering (spear phishing, whaling, vishing, dumpester diving)
countermeasures -> education
Application attacks
buffer overflow
time of check to time of use (TOCTOU)
backdoors
escalation of privilege and rootkits
Web application security
cross site scripting
cross site request forgery
sql injection
Reconnaissance attacks
IP Probes
Port scans
Vulnerability scans
Masquerading attacks
IP spoofing
session hijacking