Difference between pages "Introduction to Steganography: Steganography and Data Exfiltration" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
 
Line 1: Line 1:
'''Introduction to Steganography:  Steganography and Data Exfiltration'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,22]
+
'''Malware''' is a short version of '''Malicious Software'''.
  
 +
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
  
==   ==
+
== Virus ==
 +
A computer program that can automatically copy itself and infect a computer.
  
This virtual one-day class will introduce you to the latest methods,techniques and threats posed by steganography. Students will learn how steganography has evolved, where it is going and how it is being used by criminals and terrorist organizations. Learn about the latest techniques to detect, shunt, disrupt and destroy steganography communications. Identify those using steganography and stop the leak of vital information from your organization.
+
== Worm ==
 +
A self-replicating computer program that can automatically infect computers on a network.
  
 +
== Trojan horse ==
 +
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
  
 +
== Spyware ==
 +
A computer program that can automatically intercept or take partial control over the user's interaction.
  
'''Steganography is Global Threat!'''
+
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
  
Steganography is capable of concealing the mere existence of  incriminating  information and/or covert communications. Steganography weapons are easy to use, and are readily available to our adversaries.
+
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
  
When Steganogpraphy is used in conjunction with the internet, it becomes a globally effective tool for command control communication and intelligence.
+
== See Also ==
  
Criminals are armed with the ability to…
+
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
  
▫ Conceal incriminating information
+
=== Exploit Kit ===
▫ Covertly communicate with accomplices
+
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
▫ Innocuously share large amounts of potentially dangerous information
+
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard on July 2, 2013
+
  
'''Who Should Attend?'''
+
[[Category:Malware]]
 
+
▫ Forensic Investigators
+
▫ Local, state and federal law enforcement
+
▫ Private investigators
+
▫ IT security professionals
+
▫ Security auditors
+
 
+
 
+
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
+
 
+
 
+
----
+
 
+
'''Contact Information:'''
+
 
+
1-877-WETSTONE ext 2
+
 
+
www.wetstonetech.com [https://www.wetstonetech.com/index.html]
+

Revision as of 02:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit