Difference between pages "Malware" and "Organizations"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Analysis)
 
 
Line 1: Line 1:
'''Malware''' is a short version of '''Malicious Software'''.
+
= International Organisations =
  
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
+
* [http://www.interpol.int/Public/TechnologyCrime/default.asp INTERPOL IT Crime Unit]
  
== Virus ==
+
= US Government =
A computer program that can automatically copy itself and infect a computer.
+
  
== Worm ==
+
* [http://cybercrime.gov/ Computer Crime and Intellectual Property Section of the Department of Justice]
A self-replicating computer program that can automatically infect computers on a network.
+
* [http://www.ctin.org Computer Technology Investigators Network]
 +
* [http://www.ojp.usdoj.gov/nij/ National Institute of Justice]
 +
* [http://ncfs.ucf.edu/home.html National Center for Forensic Science]
 +
* [http://www.cftt.nist.gov/ National Institute of Standards and Technology, Computer Forensic Tool Testing]
 +
* [http://www.dc3.mil/dc3/dc3.htm Department of Defense Cyber Crime Center]
 +
* Department of [[Defense Cybercrime Center]]
 +
* [http://www.rcfl.gov/ FBI Regional Computer Forensic Laboratory Program]
 +
* [http://www.osi.andrews.af.mil/ Air Force Office of Special Investigations]
  
== Trojan horse ==
+
= Trade Organizations =
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
+
  
== Spyware ==
+
* [http://www.naidonline.org/ National Association for Information Destruction]
A computer program that can automatically intercept or take partial control over the user's interaction.
+
  
== Exploit Kit ==
+
= Professional Organizations =
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
+
  
=== Drive-by-download ===
+
* [http://www.sans.org/ The SANS Institute]
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
+
* [http://www.htcia.org/ High Technology Crime Investigation Association]
 +
* [http://www.cops.org/ International Association of Computer Investigative Specialists]
 +
* [http://www.rcfg.org/ Regional Computer Forensic Group]
 +
* [http://www.htcn.org/ High Tech Crime Network]
 +
* [http://www.aafs.org/ American Academy of Forensic Science] The AAFS Board of Directors has approved the creation of the Digital and Multi-media section, which will be voted upon during the AAFS business meeting (during the annual meeting) in Feb 2008.
 +
* [http://www.infoperitos.com/ Infoperitos - Computer Expert Witness Group from the Spanish Computer Engineers Association]
  
== Rootkit ==
+
[[Category:Organizations]]
A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to an operating system.
+
 
+
== See Also ==
+
* [[Malware analysis]]
+
 
+
== External Links ==
+
* [http://en.wikipedia.org/wiki/Malware Wikipedia: malware]
+
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia: drive-by-download]
+
* [http://www.viruslist.com/ Viruslist.com]
+
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
+
 
+
=== Analysis ===
+
* [http://sempersecurus.blogspot.ch/2013/12/a-forensic-overview-of-linux-perlbot.html A Forensic Overview of a Linux perlbot], by Andre M. DiMino, December 17, 2013
+
* [http://research.zscaler.com/2014/02/probing-into-flash-zero-day-exploit-cve.html Probing into the Flash Zero Day Exploit (CVE-2014-0502)], by Krishnan Subramanian, February 21, 2014
+
 
+
=== Exploit Kit ===
+
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
+
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard, July 2, 2013
+
* [http://www.kahusecurity.com/2013/kore-exploit-kit/ Kore Exploit Kit], Kahu Security blog, July 18, 2013
+
 
+
=== Rootkit ===
+
* [http://en.wikipedia.org/wiki/Rootkit Wikipedia: Rootkit]
+
* [http://articles.forensicfocus.com/2013/11/22/understanding-rootkits/ Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection], by Dmitry Korolev, Yuri Gubanov, Oleg Afonin, November 22, 2013
+
 
+
[[Category:Malware]]
+

Revision as of 04:14, 21 March 2014

International Organisations

US Government

Trade Organizations

Professional Organizations