mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-19 07:04:20 +01:00
sentence fix
This commit is contained in:
24
malware.md
24
malware.md
@@ -18,19 +18,19 @@ title: Malware Techniques
|
||||
|
||||
| Class | Description |
|
||||
| --- | --- |
|
||||
| **Virus** | code that propagates (replicates) across systems with user intervention |
|
||||
| **Worm** | code that self-propagates/replicates across systems without requiring user intervention |
|
||||
| **Bot** | automated process that interacts with other network services |
|
||||
| **Trojan** | malware that is often disguised as legitimate software |
|
||||
| **Ransomware** | malware that holds the victim's data hostage by cryptography or other means |
|
||||
| **Rootkit** | masks its existence or the existence of other software |
|
||||
| **Backdoor** | enables a remote attacker to have access to or send commands to a compromised computer |
|
||||
| **Virus** | Code that propagates (replicates) across systems with user intervention |
|
||||
| **Worm** | Code that self-propagates/replicates across systems without requiring user intervention |
|
||||
| **Bot** | Automated process that interacts with other network services |
|
||||
| **Trojan** | Malware that is often disguised as legitimate software |
|
||||
| **Ransomware** | Malware that holds the victim's data hostage by cryptography or other means |
|
||||
| **Rootkit** | Masks its existence or the existence of other software |
|
||||
| **Backdoor** | Enables a remote attacker to have access to or send commands to a compromised computer |
|
||||
| **RAT** | Remote Access Trojan, similar to a backdoor |
|
||||
| **Info Stealer** | steals victims information, passwords, or other personal data |
|
||||
| **HackTool** | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
|
||||
| **Hoax** | program may deliver a false warning about a computer virus or install a fake AV |
|
||||
| **Dropper/Downloader** | designed to "install" or download some sort of malware |
|
||||
| **Adware** | automatically renders advertisements in order to generate revenue for its author.|
|
||||
| **Info Stealer** | Steals victims information, passwords, or other personal data |
|
||||
| **HackTool** | Admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
|
||||
| **Hoax** | Program may deliver a false warning about a computer virus or install a fake AV |
|
||||
| **Dropper/Downloader** | Designed to "install" or download some sort of malware |
|
||||
| **Adware** | Automatically renders advertisements in order to generate revenue for its author.|
|
||||
| **PUP/PUA** | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user