The CEH v11 program provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend against future attacks.
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
Types of Malware (CEH v11)
1. Copyright EC-Council 2021. All Rights Reserved.
Types of Malware
Ransomware
Fileless Malware
Spyware
Adware
Trojans
Worms
Rootkits
Keyloggers
Bots
Mobile Malware
Certified Ethical Hacker - Version 11 Program
by EC-Council
2. Different Types of Malware
Ransomware
Fileless Malware
Spyware
Adware
Trojans
Worms
Rootkits
Keyloggers
Bots
Mobile Malware
3. Ransomware
Ransomware is malicious software that blocks authorized users from accessing their
private data until a ransom is paid for its decryption. The data is damaged or deleted
forever if the victim fails to pay the amount within the specified period.
Crypto Ransomware
1 Locker Ransomware
2
There are 2 types of ransomware:
*Read More - https://blog.eccouncil.org/ransomware-attack-what-is-it-and-what-is-it-impact/
4. Fileless Malware
Fileless malware, or non-malware, is a zero-footprint attack that does not depend
on malicious software to spread and infect the user's machine. It instead finds
existing vulnerabilities in the machine. Fileless malware illustrates the need to
shift from a traditional protect/prevent security model to advocate a detection,
one that incorporates threat intelligence, threat hunting, and blue/red/purple
teams. This threat is an example of trying to defend against the "unknown
unknowns."
Fileless malware resides in your computer's RAM and uses various malicious
tools to get into safe and trusted processes such as iexplore.exe or adobe.exe.
This is done to execute the attack and spread it across many systems within a
short period of time.
5. Spyware
Spyware stealthily collects your private data and relays it to a third
party.
The third party utilizes the stolen data for marketing, branding, and
unwanted emailers.
Spyware sneaks into your system through pirated software or illegally
downloaded content.
It mainly focuses on your internet browsing habits, which include your
frequently visited websites and downloads.
Spyware can also slow down your system’s performance.
6. Adware
Adware is programmed to send pop-up advertisements when a system
is connected to the internet.
These fake ads can be dangerous as they could automatically
download malicious code to physical storage.
However, adware is not always harmful. It is often used to increase
website reach.
7. Trojans
A trojan is malicious software that deceives the user under the pretext
of false information.
Attackers use social engineering to lure users into downloading trojan
files.
Trojans are classified based on their functionality.
Some examples are downloader trojans, banking trojans, backdoor
trojans, etc.
8. Worms
A computer worm uses a vulnerable machine as a host to scan and
infect other computers.
It is designed to replicate and spread.
A worm's success relies on security failures in the target computer.
The worm will cause harm to the network by consuming the available
bandwidth.
9. Rootkits
Some common rootkits are, Hardware or firmware rootkit, Bootloader
rootkit, Memory rootkit, and Application rootkit.
Designed to stay hidden in your computer.
Cybercriminals use rootkits to remotely control your computer.
Allows the attacker to maintain privileged access while remaining
undetected.
10. Keyloggers
Keyloggers can steal personal details like credit card data, credentials,
passwords, etc.
Hackers use keyloggers to monitor and record activities for their
malicious purposes.
The software illegally records everything you type.
The recorded information is sent to a server owned by cybercriminals.
11. Bots
A network of bots is known as a botnet, and it is used to
conduct attacks such as cryptojacking and DDoS.
A bot could be any compromised system under the control of the
threat actor.
An attacker can use a bad bot to control an affected
computer remotely.
12. Mobile Malware
Hackers use mobile malware to illegally access corporate networks,
potentially bringing unknown threats into the environment.
Mobile malware targets smartphones and tablets to gain access to
private data.
The malware is designed to exploit vulnerabilities in mobile
environments.
13. CEH v11 Certification
The CEH v11 program provides an in-
depth understanding of ethical
hacking phases, various attack
vectors, and preventative
countermeasures. It will teach you
how hackers think and act maliciously
so that you will be better positioned to
set up your security infrastructure and
defend against future attacks.
Weaknesses and vulnerabilities
help organizations strengthen
their system's security controls
to minimize the risk of an
incident.
14. Thanks for Watching!
Want to learn Ethical Hacking?
Join our next batch of EC-Council’s Ethical Hacking course