SlideShare a Scribd company logo
1 of 1
Download to read offline
isoeh.com https://www.isoeh.com/tutorialdetails/MTg3/malware-in-penetration-testing-1 
MALWARE IN PENETRATION TESTING 1 
MALWARE IN PENETRATION TESTING 1 (#isoeh) © ISOEH 2014 
for more articles visit https://www.isoeh.com/tutorial.php 
Since this month we will dive into core malware analysis, it will be better if 
we take a first hand intro into this world and its elements. 
In present scenario,cyber-espionage has replaced the old fashion spying 
methodology to obtain secret and confidential data. 
Therefore malware, together with other malicious activities are 
increasingly becoming a true weapon in the hands of the Military and 
Governments, used to re-establish the balance of power or better the 
balance of threat. 
As we all know, on the top of priority, some of the threats may impact the infrastructures are: 
Social Engineering techniques (Phishing, Scamming, Theft, Fraud and Unauthorized Activity…) 
DDoS attack to disrupt Web applications and Servers 
Malware infection infecting emails and data 
Bug and Vulnerabilities that may be used to perform an attack 
Researchers are uncovering close to 55,000 new malware samples a day, overwhelming malware analysis 
resources!! 
So what is a malware? 
Malware is: "A code designed to intentionally damage or disrupts a system and the data stored" 
Malwares have three main objectives: 
->Install on a device (e.g. a computer or smartphone). To have better chances of surviving is necessary that 
these programs have the higher compatibility with target platforms. 
->Hide from user and administrator, in order to survive the longer possible. 
To achieve his goal, the malware often uses a very sophisticated masking technique, which makes it virtually 
invisible. 
->To propagate much as possible and compromise the highest number of devices and files. 
The communication medium it’s very important for this purpose. 
Devices such as: floppy disks, Cd/DVD Rom, USB memory, emails, compromised Web pages or even File 
Sharing applications and messaging software, are propagation vectors! 
Next we will learn about propagation of malware and will start learning about core malware analysis

More Related Content

What's hot

Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber securitybrn8brwn
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information systemNimisha Walecha
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksJamesBennett15
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threatspcsafe
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security riskssamthking25
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 

What's hot (20)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Mobile security
Mobile securityMobile security
Mobile security
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Internet security
Internet securityInternet security
Internet security
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Malware
MalwareMalware
Malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Similar to Malware in penetration testing 1

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 

Similar to Malware in penetration testing 1 (20)

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
185
185185
185
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Information security
Information securityInformation security
Information security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
C3
C3C3
C3
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 

More from Arbab Usmani

Unknown Health fFact About Fruits
Unknown Health fFact About FruitsUnknown Health fFact About Fruits
Unknown Health fFact About FruitsArbab Usmani
 
Losing wweight Mindfully
Losing wweight MindfullyLosing wweight Mindfully
Losing wweight MindfullyArbab Usmani
 
Everything About Diabetes
Everything About DiabetesEverything About Diabetes
Everything About DiabetesArbab Usmani
 
Everything about blood pressure
Everything about blood pressureEverything about blood pressure
Everything about blood pressureArbab Usmani
 
Breast cancer its sympton, diagonosis and treatement
Breast cancer   its sympton, diagonosis and treatementBreast cancer   its sympton, diagonosis and treatement
Breast cancer its sympton, diagonosis and treatementArbab Usmani
 
Benefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietBenefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietArbab Usmani
 
Benefit of Brisk Walking
Benefit of Brisk WalkingBenefit of Brisk Walking
Benefit of Brisk WalkingArbab Usmani
 
wittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardwittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardArbab Usmani
 
what happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiwhat happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiArbab Usmani
 
This is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesThis is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesArbab Usmani
 
These Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistThese Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistArbab Usmani
 
Shit! Indian Signboard says
Shit! Indian Signboard saysShit! Indian Signboard says
Shit! Indian Signboard saysArbab Usmani
 
Shit ! Indian Parents Think
Shit ! Indian Parents ThinkShit ! Indian Parents Think
Shit ! Indian Parents ThinkArbab Usmani
 
Killing Photoshop: The Indian Way
Killing Photoshop: The Indian WayKilling Photoshop: The Indian Way
Killing Photoshop: The Indian WayArbab Usmani
 
#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian WayArbab Usmani
 
24 Things you don’t know about 24
24 Things you don’t know about 2424 Things you don’t know about 24
24 Things you don’t know about 24Arbab Usmani
 
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of IndiaArbab Usmani
 
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of IndiaArbab Usmani
 
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All TimeArbab Usmani
 

More from Arbab Usmani (20)

Unknown Health fFact About Fruits
Unknown Health fFact About FruitsUnknown Health fFact About Fruits
Unknown Health fFact About Fruits
 
Losing wweight Mindfully
Losing wweight MindfullyLosing wweight Mindfully
Losing wweight Mindfully
 
Everything About Diabetes
Everything About DiabetesEverything About Diabetes
Everything About Diabetes
 
Everything about blood pressure
Everything about blood pressureEverything about blood pressure
Everything about blood pressure
 
Breast cancer its sympton, diagonosis and treatement
Breast cancer   its sympton, diagonosis and treatementBreast cancer   its sympton, diagonosis and treatement
Breast cancer its sympton, diagonosis and treatement
 
Benefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietBenefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy Diet
 
Benefit of Brisk Walking
Benefit of Brisk WalkingBenefit of Brisk Walking
Benefit of Brisk Walking
 
wittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardwittiest bollywood lines you ever heard
wittiest bollywood lines you ever heard
 
what happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiwhat happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindi
 
This is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesThis is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other movies
 
These Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistThese Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still Exist
 
Shit! Indian Signboard says
Shit! Indian Signboard saysShit! Indian Signboard says
Shit! Indian Signboard says
 
Shit ! Indians Do
Shit ! Indians DoShit ! Indians Do
Shit ! Indians Do
 
Shit ! Indian Parents Think
Shit ! Indian Parents ThinkShit ! Indian Parents Think
Shit ! Indian Parents Think
 
Killing Photoshop: The Indian Way
Killing Photoshop: The Indian WayKilling Photoshop: The Indian Way
Killing Photoshop: The Indian Way
 
#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way
 
24 Things you don’t know about 24
24 Things you don’t know about 2424 Things you don’t know about 24
24 Things you don’t know about 24
 
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
 
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
 
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Malware in penetration testing 1

  • 1. isoeh.com https://www.isoeh.com/tutorialdetails/MTg3/malware-in-penetration-testing-1 MALWARE IN PENETRATION TESTING 1 MALWARE IN PENETRATION TESTING 1 (#isoeh) © ISOEH 2014 for more articles visit https://www.isoeh.com/tutorial.php Since this month we will dive into core malware analysis, it will be better if we take a first hand intro into this world and its elements. In present scenario,cyber-espionage has replaced the old fashion spying methodology to obtain secret and confidential data. Therefore malware, together with other malicious activities are increasingly becoming a true weapon in the hands of the Military and Governments, used to re-establish the balance of power or better the balance of threat. As we all know, on the top of priority, some of the threats may impact the infrastructures are: Social Engineering techniques (Phishing, Scamming, Theft, Fraud and Unauthorized Activity…) DDoS attack to disrupt Web applications and Servers Malware infection infecting emails and data Bug and Vulnerabilities that may be used to perform an attack Researchers are uncovering close to 55,000 new malware samples a day, overwhelming malware analysis resources!! So what is a malware? Malware is: "A code designed to intentionally damage or disrupts a system and the data stored" Malwares have three main objectives: ->Install on a device (e.g. a computer or smartphone). To have better chances of surviving is necessary that these programs have the higher compatibility with target platforms. ->Hide from user and administrator, in order to survive the longer possible. To achieve his goal, the malware often uses a very sophisticated masking technique, which makes it virtually invisible. ->To propagate much as possible and compromise the highest number of devices and files. The communication medium it’s very important for this purpose. Devices such as: floppy disks, Cd/DVD Rom, USB memory, emails, compromised Web pages or even File Sharing applications and messaging software, are propagation vectors! Next we will learn about propagation of malware and will start learning about core malware analysis