Malware - A broad term for any software intentionally designed to cause damage or harm to a computer system., Virus - A program that attaches itself to a legitimate program or file and spreads to other files or systems., Worm - A self-replicating program that spreads without needing a host file, usually through networks, Trojan Horse (Trojan) - malicious software that disguises itself as legitimate software to trick users into installing it, then performs unauthorized and harmful actions on their device, such as stealing data, damaging the system, or creating a backdoor for further intrusion., Spyware - Software that secretly collects information about users, often for malicious purposes., Adware - Software that automatically displays or downloads unwanted ads, sometimes bundled with other programs., Ransomware - Malicious software that encrypts the victim’s files and demands payment for the decryption key., Rootkit - Software designed to gain unauthorized access to a system, often with the intent of hiding other types of malware., Keylogger - A type of spyware that records every keystroke made by a user, often used for stealing sensitive information like passwords., Backdoor - A secret method for bypassing normal authentication to access a system, often installed by a Trojan or virus., Botnet - A network of infected devices (often called "bots") that can be controlled remotely to launch attacks (like DDoS)., Fileless Malware - Malware that operates without being stored on disk, often living in memory to avoid detection., Downloader - Malware designed to download and install other malicious software on a compromised system., Macro Virus - A virus embedded in the macros of documents like Word or Excel files, which activates when the document is opened., Drive-by Download - Malware that is downloaded automatically when a user visits a compromised or malicious website., Phishing - A method of tricking users into giving up sensitive information like passwords or credit card numbers., Spear Phishing - A more targeted form of phishing aimed at specific individuals or organizations., Zero Day - A vulnerability that is exploited by attackers before it is discovered or patched by the software vendor., Polymorphic Malware - Malware that changes its code to avoid detection by antivirus software., Dropper - A type of malware that installs other malware files onto your device. Unlike a downloader, this type doesn't have to connect to the internet to drop malicious files., Obfuscator - A type of malware that hides its code and purpose, making it more difficult for security software to detect or remove., Password Stealer - A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a key logger, which collects and sends information about the keys you press and websites you visit., Potentially Unwanted Program - Software or an app that you don’t explicitly want on your device which are usually bundled with freeware and often installs without your permission., File Hash - a unique, fixed-length string of characters that acts as a digital fingerprint for a file, generated by a one-way mathematical function called a hashing algorithm., Masquerading - Attackers often rename malicious files to make them look like legitimate ones. This technique helps them avoid detection by security tools that may be looking for specific process names.,
0%
Malware Analysis: Key Terms
Dela
Dela
Dela
av
Cpittma6
Redigera innehåll
Skriv ut
Bädda in
Mer
Uppdrag
Rankningslista
Visa mer
Visa mindre
Denna topplista är för närvarande privat. Klicka på
dela
för att göra den offentlig.
Denna topplista har inaktiverats av resursägaren.
Denna topplista är inaktiverad eftersom att alternativen är olika för resursägarna.
Återgå alternativ
Matcha upp
är en öppen mall. Det genererar inte noter för en poänglista.
Inloggning krävs
Visuell stil
Teckensnitt
Prenumeration krävs
Alternativ
Växla mall
Visa alla
Flera format visas när du spelar aktiviteten.
Öppna resultat
Kopiera länk
QR-kod
Ta bort
Återställ sparas automatiskt:
?