SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
isoeh.com https://www.isoeh.com/tutorialdetails/MTg3/malware-in-penetration-testing-1 
MALWARE IN PENETRATION TESTING 1 
MALWARE IN PENETRATION TESTING 1 (#isoeh) © ISOEH 2014 
for more articles visit https://www.isoeh.com/tutorial.php 
Since this month we will dive into core malware analysis, it will be better if 
we take a first hand intro into this world and its elements. 
In present scenario,cyber-espionage has replaced the old fashion spying 
methodology to obtain secret and confidential data. 
Therefore malware, together with other malicious activities are 
increasingly becoming a true weapon in the hands of the Military and 
Governments, used to re-establish the balance of power or better the 
balance of threat. 
As we all know, on the top of priority, some of the threats may impact the infrastructures are: 
Social Engineering techniques (Phishing, Scamming, Theft, Fraud and Unauthorized Activity…) 
DDoS attack to disrupt Web applications and Servers 
Malware infection infecting emails and data 
Bug and Vulnerabilities that may be used to perform an attack 
Researchers are uncovering close to 55,000 new malware samples a day, overwhelming malware analysis 
resources!! 
So what is a malware? 
Malware is: "A code designed to intentionally damage or disrupts a system and the data stored" 
Malwares have three main objectives: 
->Install on a device (e.g. a computer or smartphone). To have better chances of surviving is necessary that 
these programs have the higher compatibility with target platforms. 
->Hide from user and administrator, in order to survive the longer possible. 
To achieve his goal, the malware often uses a very sophisticated masking technique, which makes it virtually 
invisible. 
->To propagate much as possible and compromise the highest number of devices and files. 
The communication medium it’s very important for this purpose. 
Devices such as: floppy disks, Cd/DVD Rom, USB memory, emails, compromised Web pages or even File 
Sharing applications and messaging software, are propagation vectors! 
Next we will learn about propagation of malware and will start learning about core malware analysis

Weitere ähnliche Inhalte

Was ist angesagt?

Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber securitybrn8brwn
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threatspcsafe
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 

Was ist angesagt? (20)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Mobile security
Mobile securityMobile security
Mobile security
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Internet security
Internet securityInternet security
Internet security
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Malware
MalwareMalware
Malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Ähnlich wie Malware in penetration testing 1

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 

Ähnlich wie Malware in penetration testing 1 (20)

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
185
185185
185
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Information security
Information securityInformation security
Information security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
C3
C3C3
C3
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 

Mehr von Arbab Usmani

Unknown Health fFact About Fruits
Unknown Health fFact About FruitsUnknown Health fFact About Fruits
Unknown Health fFact About FruitsArbab Usmani
 
Losing wweight Mindfully
Losing wweight MindfullyLosing wweight Mindfully
Losing wweight MindfullyArbab Usmani
 
Everything About Diabetes
Everything About DiabetesEverything About Diabetes
Everything About DiabetesArbab Usmani
 
Everything about blood pressure
Everything about blood pressureEverything about blood pressure
Everything about blood pressureArbab Usmani
 
Breast cancer its sympton, diagonosis and treatement
Breast cancer   its sympton, diagonosis and treatementBreast cancer   its sympton, diagonosis and treatement
Breast cancer its sympton, diagonosis and treatementArbab Usmani
 
Benefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietBenefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietArbab Usmani
 
Benefit of Brisk Walking
Benefit of Brisk WalkingBenefit of Brisk Walking
Benefit of Brisk WalkingArbab Usmani
 
wittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardwittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardArbab Usmani
 
what happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiwhat happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiArbab Usmani
 
This is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesThis is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesArbab Usmani
 
These Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistThese Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistArbab Usmani
 
Shit! Indian Signboard says
Shit! Indian Signboard saysShit! Indian Signboard says
Shit! Indian Signboard saysArbab Usmani
 
Shit ! Indian Parents Think
Shit ! Indian Parents ThinkShit ! Indian Parents Think
Shit ! Indian Parents ThinkArbab Usmani
 
Killing Photoshop: The Indian Way
Killing Photoshop: The Indian WayKilling Photoshop: The Indian Way
Killing Photoshop: The Indian WayArbab Usmani
 
#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian WayArbab Usmani
 
24 Things you don’t know about 24
24 Things you don’t know about 2424 Things you don’t know about 24
24 Things you don’t know about 24Arbab Usmani
 
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of IndiaArbab Usmani
 
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of IndiaArbab Usmani
 
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All TimeArbab Usmani
 

Mehr von Arbab Usmani (20)

Unknown Health fFact About Fruits
Unknown Health fFact About FruitsUnknown Health fFact About Fruits
Unknown Health fFact About Fruits
 
Losing wweight Mindfully
Losing wweight MindfullyLosing wweight Mindfully
Losing wweight Mindfully
 
Everything About Diabetes
Everything About DiabetesEverything About Diabetes
Everything About Diabetes
 
Everything about blood pressure
Everything about blood pressureEverything about blood pressure
Everything about blood pressure
 
Breast cancer its sympton, diagonosis and treatement
Breast cancer   its sympton, diagonosis and treatementBreast cancer   its sympton, diagonosis and treatement
Breast cancer its sympton, diagonosis and treatement
 
Benefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietBenefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy Diet
 
Benefit of Brisk Walking
Benefit of Brisk WalkingBenefit of Brisk Walking
Benefit of Brisk Walking
 
wittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardwittiest bollywood lines you ever heard
wittiest bollywood lines you ever heard
 
what happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiwhat happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindi
 
This is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesThis is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other movies
 
These Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistThese Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still Exist
 
Shit! Indian Signboard says
Shit! Indian Signboard saysShit! Indian Signboard says
Shit! Indian Signboard says
 
Shit ! Indians Do
Shit ! Indians DoShit ! Indians Do
Shit ! Indians Do
 
Shit ! Indian Parents Think
Shit ! Indian Parents ThinkShit ! Indian Parents Think
Shit ! Indian Parents Think
 
Killing Photoshop: The Indian Way
Killing Photoshop: The Indian WayKilling Photoshop: The Indian Way
Killing Photoshop: The Indian Way
 
#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way
 
24 Things you don’t know about 24
24 Things you don’t know about 2424 Things you don’t know about 24
24 Things you don’t know about 24
 
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
 
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
 
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
 

Kürzlich hochgeladen

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Malware in penetration testing 1

  • 1. isoeh.com https://www.isoeh.com/tutorialdetails/MTg3/malware-in-penetration-testing-1 MALWARE IN PENETRATION TESTING 1 MALWARE IN PENETRATION TESTING 1 (#isoeh) © ISOEH 2014 for more articles visit https://www.isoeh.com/tutorial.php Since this month we will dive into core malware analysis, it will be better if we take a first hand intro into this world and its elements. In present scenario,cyber-espionage has replaced the old fashion spying methodology to obtain secret and confidential data. Therefore malware, together with other malicious activities are increasingly becoming a true weapon in the hands of the Military and Governments, used to re-establish the balance of power or better the balance of threat. As we all know, on the top of priority, some of the threats may impact the infrastructures are: Social Engineering techniques (Phishing, Scamming, Theft, Fraud and Unauthorized Activity…) DDoS attack to disrupt Web applications and Servers Malware infection infecting emails and data Bug and Vulnerabilities that may be used to perform an attack Researchers are uncovering close to 55,000 new malware samples a day, overwhelming malware analysis resources!! So what is a malware? Malware is: "A code designed to intentionally damage or disrupts a system and the data stored" Malwares have three main objectives: ->Install on a device (e.g. a computer or smartphone). To have better chances of surviving is necessary that these programs have the higher compatibility with target platforms. ->Hide from user and administrator, in order to survive the longer possible. To achieve his goal, the malware often uses a very sophisticated masking technique, which makes it virtually invisible. ->To propagate much as possible and compromise the highest number of devices and files. The communication medium it’s very important for this purpose. Devices such as: floppy disks, Cd/DVD Rom, USB memory, emails, compromised Web pages or even File Sharing applications and messaging software, are propagation vectors! Next we will learn about propagation of malware and will start learning about core malware analysis