Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 39 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Tiêu đề
Malicious Attacks, Threats
Định dạng
Số trang
39
Dung lượng
1,24 MB
Nội dung
.c om cu u du o ng th an co ng Malicious Attacks CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Contents Malicious Attack 2) Attack Tools 3) The common types of malicious attacks 4) Malicious Software cu u du o ng th an co ng 1) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng 1.Malicious Attack CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? An attack on a computer system or network asset succeeds by exploiting a cu u du o ng th an co ng vulnerability in the system CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? ng An attack can consist of all or a combination of these four categories: co a) Fabrications: involve the creation of some deception in order to trick cu u du o ng th an unsuspecting users CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? b) Interceptions: involve eavesdropping on transmissions and redirecting cu u du o ng th an co ng them for unauthorized use CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? c) Interruptions: An interruption causes a break in a communication cu u du o ng th an co ng channel, which blocks the transmission of data CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is a Malicious Attack? d) Modifications: A modification is the alteration of data contained in cu u du o ng th an co ng transmissions or files CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Attack Tools CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Attack Tools Protocol analyzers co ng Port scanners an OS fingerprint scanners th Vulnerability scanners Wardialers cu Password crackers u du o ng Exploit software Keystroke loggers CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Man-in-the-Middle Attacks cu u du o ng th an co them on to their intended destination ng An attacker intercepts messages between two parties before transferring CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Social Engineering Social engineering involves tricking authorized users into carrying out co ng actions for unauthorized users th an Phishing du o u Pretexting cu Baiting ng Spear phishing CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Denial of service - DOS A Denial-of-Service (DoS) attack is an attack meant to shut down a cu u du o ng th an co ng machine or network, making it inaccessible to its intended users Distributed Denial of Service CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om cu u du o ng th an co ng Malicious Software CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What Is Malicious Software? Malicious software - Malware, commonly known as malware, is any co ng software that brings harm to a computer system th an Malware exists in two main categories: du o ng Infecting programs: actively attempt to copy themselves to other u computers (Viruses, Worms) cu Hiding programs: Trojan horses, Rootkits, Spyware CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Viruses A computer virus is a software program that attaches itself to or copies co ng itself into another program on a computer th an Virus has three parts: ng Infection mechanism: How a virus spreads du o Trigger: The means of deciding whether to deliver the payload or not cu u Payload: What the virus does, besides spread CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Viruses cu u du o ng th an co ng Phases of virus: CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Viruses CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Viruses CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om WORM The worm is a standalone program that replicates and sends copies of itself to co ng other computers, generally across a network, without any user input or action an Self replicating approaches: File sharing Remote login cu u Remote execution du o ng th Email CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om WORM Phases: co ng Dormant th an Propagation du o u cu Execution ng Trigger CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Trojan horses A Trojan horse, also called a Trojan, is malware that masquerades as a co ng useful program th an A Trojan is dierent from a virus as it does not copy its code to other hosts cu u du o ng or boot areas CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Rootkits Collection of attacker tools installed after an intruder has gained access an th File/process/user hiding tools co ng Log cleanners du o Backdoor programs ng Network sniffer cu u Rootkits often work with other malware CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Spyware Spyware is software that aims to gather information about a person or co ng organization without their knowledge, that may send such information to cu u du o ng th an another entity without the consumer's consent CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt ... network and cu u du o ng th an co ng retransmitting them to produce an unauthorized effect CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Man-in-the-Middle Attacks cu u du o ng th an. .. Fingerprint Scanners An operating system (OS) fingerprint scanner is a software program that co ng allows an attacker to send a variety of packets to an IP host device, hoping th an to determine... ng th an impersonating another computing system CuuDuongThanCong.com https://fb.com/tailieudientucntt cu u du o ng th an co ng c om Address resolution protocol (ARP) poisoning CuuDuongThanCong.com