Difference between pages "Fernico ZRT" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Added expand template)
 
 
Line 1: Line 1:
{{wikify}}{{Expand}}
+
'''Malware''' is a short version of '''Malicious Software'''.
  
The [[Fernico]] ZRT Cell Phone Examination tool is a manual examination and reporting tool for cell phones. It attempts to streamline the process of taking photographs of screen displays and merges those
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
photos into custom designed report templates.
+
  
== Key Features ==
+
== Virus ==
• Handles ALL mobile phones, PDAs, GPSs and other digital devices.<br/>
+
A computer program that can automatically copy itself and infect a computer.
• Does not require a specific cable to extract the data.<br/>
+
 
• Combines photo taking with an integrated reporting tool.<br/>
+
== Worm ==
A Canon A640 camera (10 megapixels), mounted on a flexible arm secured to a desk mount clamp, is completely controlled by ZRT software.<br/>
+
A self-replicating computer program that can automatically infect computers on a network.
• Camera is mains powered – no storage card is inserted into the camera – photos are transferred directly to the PC.<br/>
+
 
• Digital device sits on a non slip-mat – easily configured for left or right handed users.<br/>
+
== Trojan horse ==
• Off line version allows photos taken with other cameras to be incorporated into the reporting tool.<br/>
+
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
• Photos are automatically inserted into a selectable evidence report template and easily converted into pdf format.<br/>
+
 
• Very simple to set up and portable.<br/>
+
== Spyware ==
• Fastest manual method to acquire evidential data from any digital device.<br/>
+
A computer program that can automatically intercept or take partial control over the user's interaction.
• Can either be used by an operator or customized, with personal profiles, by an experienced mobile phone investigator.<br/>
+
 
• Text watermarks can be placed on the photos with a crop-photo tool for device close-ups.<br/>
+
== Exploit Kit ==
• ZRT 1-day on-site or off-site training courses available.<br/>
+
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
 +
 
 +
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
 +
 
 +
== See Also ==
 +
 
 +
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
 +
 
 +
=== Exploit Kit ===
 +
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
 +
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard on July 2, 2013
 +
 
 +
[[Category:Malware]]

Revision as of 01:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit