Difference between pages "Fernico ZRT" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Changed to more neutral style. Still needs cleanup)
 
 
Line 1: Line 1:
{{wikify}}
+
'''Malware''' is a short version of '''Malicious Software'''.
The [[Fernico]] ZRT Cell Phone Examination tool is a manual examination and reporting tool for cell phones. It attempts to streamline the process of taking photographs of screen displays and merges those
+
photos into custom designed report templates.
+
  
== Key Features ==
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
• Handles ALL mobile phones, PDAs, GPSs and other digital devices.<br/>
+
 
• Does not require a specific cable to extract the data.<br/>
+
== Virus ==
• Combines photo taking with an integrated reporting tool.<br/>
+
A computer program that can automatically copy itself and infect a computer.
A Canon A640 camera (10 megapixels), mounted on a flexible arm secured to a desk mount clamp, is completely controlled by ZRT software.<br/>
+
 
• Camera is mains powered – no storage card is inserted into the camera – photos are transferred directly to the PC.<br/>
+
== Worm ==
• Digital device sits on a non slip-mat – easily configured for left or right handed users.<br/>
+
A self-replicating computer program that can automatically infect computers on a network.
• Off line version allows photos taken with other cameras to be incorporated into the reporting tool.<br/>
+
 
• Photos are automatically inserted into a selectable evidence report template and easily converted into pdf format.<br/>
+
== Trojan horse ==
• Very simple to set up and portable.<br/>
+
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
• Fastest manual method to acquire evidential data from any digital device.<br/>
+
 
• Can either be used by an operator or customized, with personal profiles, by an experienced mobile phone investigator.<br/>
+
== Spyware ==
• Text watermarks can be placed on the photos with a crop-photo tool for device close-ups.<br/>
+
A computer program that can automatically intercept or take partial control over the user's interaction.
• ZRT 1-day on-site or off-site training courses available.<br/>
+
 
 +
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
 +
 
 +
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
 +
 
 +
== See Also ==
 +
 
 +
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
 +
 
 +
=== Exploit Kit ===
 +
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
 +
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard on July 2, 2013
 +
 
 +
[[Category:Malware]]

Revision as of 01:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit