Term
IOC - Indicators of Compromise |
|
Definition
Artifacts observed that indicate a computer intrusion |
|
|
Term
|
Definition
Malicious Code the requires user interaction to install and replicate. |
|
|
Term
|
Definition
Self-replicating program that is usually self contained and can execute and spread WITHOUT user interaction. |
|
|
Term
|
Definition
Friendly software that contains hidden malicious software. |
|
|
Term
|
Definition
|
|
Term
|
Definition
NetBUS, Project BioNET, Sub7, BackOrifice, BO2k, Beast |
|
|
Term
|
Definition
Malicious code that installs itself at the OS or Kernel level to avoid detection |
|
|
Term
|
Definition
Malicious app that once installed can capture all keystrokes. |
|
|
Term
|
Definition
Malicious software that captures user activity and reports back |
|
|
Term
|
Definition
Malicious code that infects large numbers of hosts for the purpose of launching large scale attacks on specific targets. |
|
|
Term
|
Definition
Malicious code that triggers after a period of time based onn some date or specific activity |
|
|
Term
|
Definition
Software that installs for the purpose of opening ports and installing additional software |
|
|
Term
|
Definition
|
|
Term
|
Definition
An attack that redirects the user to a fraudulent site without their knowledge |
|
|
Term
Man In The Browser
https://www.owasp.org/index.php/Man-in-the-browser_attack |
|
Definition
A previously installed Trojan Horse is used to intercept and manipulate calls between the main application’s executable (ex: the browser) and its security mechanisms or libraries on-the-fly.
The most common objective of this attack is to cause financial fraud by manipulating transactions of Internet Banking systems, even when other authentication factors are in use. |
|
|
Term
|
Definition
nmap -Pn -p 80 -sV --script=banner 192.168.1.106 curl -s -I 192.168.1.106 | grep -e "Server: telnet 192.168.1.106 22 ssh 192.168.1.106 22 |
|
|