SlideShare a Scribd company logo
isoeh.com https://www.isoeh.com/tutorialdetails/MTg3/malware-in-penetration-testing-1 
MALWARE IN PENETRATION TESTING 1 
MALWARE IN PENETRATION TESTING 1 (#isoeh) © ISOEH 2014 
for more articles visit https://www.isoeh.com/tutorial.php 
Since this month we will dive into core malware analysis, it will be better if 
we take a first hand intro into this world and its elements. 
In present scenario,cyber-espionage has replaced the old fashion spying 
methodology to obtain secret and confidential data. 
Therefore malware, together with other malicious activities are 
increasingly becoming a true weapon in the hands of the Military and 
Governments, used to re-establish the balance of power or better the 
balance of threat. 
As we all know, on the top of priority, some of the threats may impact the infrastructures are: 
Social Engineering techniques (Phishing, Scamming, Theft, Fraud and Unauthorized Activity…) 
DDoS attack to disrupt Web applications and Servers 
Malware infection infecting emails and data 
Bug and Vulnerabilities that may be used to perform an attack 
Researchers are uncovering close to 55,000 new malware samples a day, overwhelming malware analysis 
resources!! 
So what is a malware? 
Malware is: "A code designed to intentionally damage or disrupts a system and the data stored" 
Malwares have three main objectives: 
->Install on a device (e.g. a computer or smartphone). To have better chances of surviving is necessary that 
these programs have the higher compatibility with target platforms. 
->Hide from user and administrator, in order to survive the longer possible. 
To achieve his goal, the malware often uses a very sophisticated masking technique, which makes it virtually 
invisible. 
->To propagate much as possible and compromise the highest number of devices and files. 
The communication medium it’s very important for this purpose. 
Devices such as: floppy disks, Cd/DVD Rom, USB memory, emails, compromised Web pages or even File 
Sharing applications and messaging software, are propagation vectors! 
Next we will learn about propagation of malware and will start learning about core malware analysis

More Related Content

What's hot

Internet security issues
Internet security issuesInternet security issues
Internet security issues
irfan shaikh
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
daniyalqureshi712
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
UK Defence Cyber School
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
mastermind07
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Virus
VirusVirus
Virus
CHITRA S
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
brn8brwn
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
Nimisha Walecha
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
NihanthReddyBalaiahg
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
pcsafe
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
samthking25
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
 
Internet security
Internet securityInternet security
Internet security
rfukunaga
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
justin johnson
 
Malware
MalwareMalware
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 

What's hot (20)

Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Virus
VirusVirus
Virus
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Threats to an information system
Threats to an information systemThreats to an information system
Threats to an information system
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Mobile security
Mobile securityMobile security
Mobile security
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Internet security
Internet securityInternet security
Internet security
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Malware
MalwareMalware
Malware
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Similar to Malware in penetration testing 1

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
Elsayed Muhammad
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
185
185185
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
Muhammad FAHAD
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
AliyuMuhammadButu
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
Diane M. Metcalf
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
Jessica Howard
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
C3
C3C3
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
GudipudiDayanandam
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 

Similar to Malware in penetration testing 1 (20)

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
185
185185
185
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Information security
Information securityInformation security
Information security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
C3
C3C3
C3
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 

More from Arbab Usmani

Unknown Health fFact About Fruits
Unknown Health fFact About FruitsUnknown Health fFact About Fruits
Unknown Health fFact About Fruits
Arbab Usmani
 
Losing wweight Mindfully
Losing wweight MindfullyLosing wweight Mindfully
Losing wweight Mindfully
Arbab Usmani
 
Everything About Diabetes
Everything About DiabetesEverything About Diabetes
Everything About Diabetes
Arbab Usmani
 
Everything about blood pressure
Everything about blood pressureEverything about blood pressure
Everything about blood pressure
Arbab Usmani
 
Breast cancer its sympton, diagonosis and treatement
Breast cancer   its sympton, diagonosis and treatementBreast cancer   its sympton, diagonosis and treatement
Breast cancer its sympton, diagonosis and treatement
Arbab Usmani
 
Benefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietBenefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy Diet
Arbab Usmani
 
Benefit of Brisk Walking
Benefit of Brisk WalkingBenefit of Brisk Walking
Benefit of Brisk Walking
Arbab Usmani
 
wittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardwittiest bollywood lines you ever heard
wittiest bollywood lines you ever heard
Arbab Usmani
 
what happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiwhat happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindi
Arbab Usmani
 
This is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesThis is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other movies
Arbab Usmani
 
These Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistThese Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still Exist
Arbab Usmani
 
Shit! Indian Signboard says
Shit! Indian Signboard saysShit! Indian Signboard says
Shit! Indian Signboard says
Arbab Usmani
 
Shit ! Indians Do
Shit ! Indians DoShit ! Indians Do
Shit ! Indians Do
Arbab Usmani
 
Shit ! Indian Parents Think
Shit ! Indian Parents ThinkShit ! Indian Parents Think
Shit ! Indian Parents Think
Arbab Usmani
 
Killing Photoshop: The Indian Way
Killing Photoshop: The Indian WayKilling Photoshop: The Indian Way
Killing Photoshop: The Indian Way
Arbab Usmani
 
#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way
Arbab Usmani
 
24 Things you don’t know about 24
24 Things you don’t know about 2424 Things you don’t know about 24
24 Things you don’t know about 24
Arbab Usmani
 
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
Arbab Usmani
 
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
Arbab Usmani
 
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
Arbab Usmani
 

More from Arbab Usmani (20)

Unknown Health fFact About Fruits
Unknown Health fFact About FruitsUnknown Health fFact About Fruits
Unknown Health fFact About Fruits
 
Losing wweight Mindfully
Losing wweight MindfullyLosing wweight Mindfully
Losing wweight Mindfully
 
Everything About Diabetes
Everything About DiabetesEverything About Diabetes
Everything About Diabetes
 
Everything about blood pressure
Everything about blood pressureEverything about blood pressure
Everything about blood pressure
 
Breast cancer its sympton, diagonosis and treatement
Breast cancer   its sympton, diagonosis and treatementBreast cancer   its sympton, diagonosis and treatement
Breast cancer its sympton, diagonosis and treatement
 
Benefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy DietBenefit Of Healthy Eating - A Guide For Healthy Diet
Benefit Of Healthy Eating - A Guide For Healthy Diet
 
Benefit of Brisk Walking
Benefit of Brisk WalkingBenefit of Brisk Walking
Benefit of Brisk Walking
 
wittiest bollywood lines you ever heard
wittiest bollywood lines you ever heardwittiest bollywood lines you ever heard
wittiest bollywood lines you ever heard
 
what happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindiwhat happen when Hollywood movie dubbed in hindi
what happen when Hollywood movie dubbed in hindi
 
This is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other moviesThis is how Hollywood copy posters from other movies
This is how Hollywood copy posters from other movies
 
These Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still ExistThese Picture Will Tell You That Humanity Still Exist
These Picture Will Tell You That Humanity Still Exist
 
Shit! Indian Signboard says
Shit! Indian Signboard saysShit! Indian Signboard says
Shit! Indian Signboard says
 
Shit ! Indians Do
Shit ! Indians DoShit ! Indians Do
Shit ! Indians Do
 
Shit ! Indian Parents Think
Shit ! Indian Parents ThinkShit ! Indian Parents Think
Shit ! Indian Parents Think
 
Killing Photoshop: The Indian Way
Killing Photoshop: The Indian WayKilling Photoshop: The Indian Way
Killing Photoshop: The Indian Way
 
#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way#BreakingStereotypes The Indian Way
#BreakingStereotypes The Indian Way
 
24 Things you don’t know about 24
24 Things you don’t know about 2424 Things you don’t know about 24
24 Things you don’t know about 24
 
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
 
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
23 More Pictures Which Will Prove Why Jugaad Is Greatest Invention Of India
 
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
20 Reason Why Deadpool Is Greatest Anti Hero Of All Time
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Malware in penetration testing 1

  • 1. isoeh.com https://www.isoeh.com/tutorialdetails/MTg3/malware-in-penetration-testing-1 MALWARE IN PENETRATION TESTING 1 MALWARE IN PENETRATION TESTING 1 (#isoeh) © ISOEH 2014 for more articles visit https://www.isoeh.com/tutorial.php Since this month we will dive into core malware analysis, it will be better if we take a first hand intro into this world and its elements. In present scenario,cyber-espionage has replaced the old fashion spying methodology to obtain secret and confidential data. Therefore malware, together with other malicious activities are increasingly becoming a true weapon in the hands of the Military and Governments, used to re-establish the balance of power or better the balance of threat. As we all know, on the top of priority, some of the threats may impact the infrastructures are: Social Engineering techniques (Phishing, Scamming, Theft, Fraud and Unauthorized Activity…) DDoS attack to disrupt Web applications and Servers Malware infection infecting emails and data Bug and Vulnerabilities that may be used to perform an attack Researchers are uncovering close to 55,000 new malware samples a day, overwhelming malware analysis resources!! So what is a malware? Malware is: "A code designed to intentionally damage or disrupts a system and the data stored" Malwares have three main objectives: ->Install on a device (e.g. a computer or smartphone). To have better chances of surviving is necessary that these programs have the higher compatibility with target platforms. ->Hide from user and administrator, in order to survive the longer possible. To achieve his goal, the malware often uses a very sophisticated masking technique, which makes it virtually invisible. ->To propagate much as possible and compromise the highest number of devices and files. The communication medium it’s very important for this purpose. Devices such as: floppy disks, Cd/DVD Rom, USB memory, emails, compromised Web pages or even File Sharing applications and messaging software, are propagation vectors! Next we will learn about propagation of malware and will start learning about core malware analysis