Difference between pages "The Art of Keylogging" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Created page with ''''The Art of Keylogging'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,32] == == WetStone has created a unique virtualized cyber-safe environment where investigators …')
 
 
Line 1: Line 1:
'''The Art of Keylogging'''[http://www.wetstonetech.com/cgi-bin/shop.cgi?view,32]
+
'''Malware''' is a short version of '''Malicious Software'''.
  
 +
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
  
==   ==
+
== Virus ==
 +
A computer program that can automatically copy itself and infect a computer.
  
WetStone has created a unique virtualized cyber-safe environment where investigators and information technology professionals can experiment with key logging technologies, including both software based and hardware based. Beyond the offensive use of these tools, investigators will discover how to investigate keyloggers with varied sophistication levels. To truly get into the mind of a cyber criminal an investigator must know what they are looking for, and then deeply understand how the tools they uncover work. Establishing this can mean the difference between pulling the plug on a memory resident keyloggers, and losing all traces of evidence, or uncovering the activity needed for prosecution.
+
== Worm ==
 +
A self-replicating computer program that can automatically infect computers on a network.
  
 +
== Trojan horse ==
 +
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
  
 +
== Spyware ==
 +
A computer program that can automatically intercept or take partial control over the user's interaction.
  
'''Is Someone Looking Over Your Shoulder?'''
+
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
  
Desktops without keyboards, and laptops without keys are like baseball without a bat. It is impossible to take away keyboards from computers and still be efficient and functional. The question that then surfaces is, how do we secure them? Keyboards are under attack from software and hardware based tools designed to steal the content typed on the keys. Whether infected at home or at work, keyloggers are responsible for massive amounts of identity theft and corporate leakage of data.
+
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
  
+
== See Also ==
  
'''Who Should Attend?'''
+
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
  
▫ Forensic Investigators
+
=== Exploit Kit ===
▫ Local, state and federal law enforcement
+
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
▫ Private investigators
+
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard on July 2, 2013
▫ IT security professionals
+
▫ Security auditors
+
  
 
+
[[Category:Malware]]
Our trainers take you inside the minds of today’s criminals and students completeing the class will be able to execute a full investigation in the respective discipline. Participants proficiency in the above skills will be tested with certification exams.
+
 
+
 
+
----
+
 
+
'''Contact Information:'''
+
 
+
1-877-WETSTONE ext 2
+
 
+
www.wetstonetech.com [https://www.wetstonetech.com/index.html]
+

Revision as of 01:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit