Difference between pages "Matriux" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(HackingTeam)
 
Line 1: Line 1:
{{expand}}
+
'''Malware''' is a short version of '''Malicious Software'''.
  
{{Infobox_Software |
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
  name = Matriux |
+
  maintainer = [[Matriux Project]] |
+
  os = {{Linux}} |
+
  genre = {{Live CD}} |
+
  license = {{GPL}}, others |
+
  website = http://www.matriux.com/ |
+
}}
+
  
A [[Linux]] [[Live CD]] intended for [[Penetration Testing|penetration testing]].
+
== Virus ==
 +
A computer program that can automatically copy itself and infect a computer.
  
 
+
== Worm ==
[[Matriux]] is a fully featured security distribution, based on [[Ubuntu]]. It consists of powerful, free and open source computer forensics and data recovery tools which can be used for forensics analysis and investigation purposes.
+
A self-replicating computer program that can automatically infect computers on a network.
  
Apart from forensics usages Matriux also provides a wide platform to let security professionals utilize the power of open source to perform day-to-day web application penetration testing and server hardening tasks.
+
== Trojan horse ==
 +
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
  
Matriux is lite and designed to run from a CD / DVD or USB stick or it can easily be installed to your hard disk in a few steps in no time.
+
== Spyware ==
 +
A computer program that can automatically intercept or take partial control over the user's interaction.
  
== History ==
+
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
  
An Indian infosec professional [http://manuzacharia.blogspot.com/ ''Manu Zacharia'']  had initialized the idea of developing Matriux as a security distribution in 2008 and by the end of 2009 on 5th December released the Matriux '''Lithium''' version at [http://clubhack.com/2009/ ClubHack2009] Its successor Matriux '''Xenon''' was released on December 4, 2010 at [http://clubhack.com/2010/ ClubHack2010]
+
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
  
Matriux is also Asia's first OS for hacking, penetration testing, and cyber forensic investigation.
+
== Rootkit ==
 +
A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to an operating system.
  
[http://www.matriux.com/index.php?page=download ''Matriux Krypton''], We have officially released it
+
== See Also ==
 
+
* [[Malware analysis]]
==Tools==
+
 
+
[[File:Matriux Xenon.jpg|450px|right|thumb|Matriux Xenon showing forensics tools in it's Arsenal]]
+
 
+
Matriux offers many forensics tools under its [http://www.Matriux.com/index.php?page=arsenal ''Arsenal''] in '''Digital-Forensics''' category
+
 
+
 
+
'''Acquisition'''
+
* Automated Image & Restore 1.28
+
* [[Guymager]]
+
 
+
'''Analysis'''
+
 
+
* ''Start Autopsy''
+
* ''Autopsy Forensics Browser''
+
* ''Gpart''
+
* ''Pasco''
+
* ''Vinetto''
+
* ''Start WarVOX''
+
* ''Open WarVOX Web Interface''
+
* ''Xplico Console Mode (Internet Traffic Decoder)''
+
* ''Xplico Web Interface (Internet Traffic Decoder)''
+
 
+
'''Dhash'''
+
  
 
== External Links ==
 
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia: malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia: drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
  
 +
=== Analysis ===
 +
* [http://sempersecurus.blogspot.ch/2013/12/a-forensic-overview-of-linux-perlbot.html A Forensic Overview of a Linux perlbot], by Andre M. DiMino, December 17, 2013
 +
* [http://research.zscaler.com/2014/02/probing-into-flash-zero-day-exploit-cve.html Probing into the Flash Zero Day Exploit (CVE-2014-0502)], by Krishnan Subramanian, February 21, 2014
 +
* [http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf Operation Windigo], by Olivier Bilodeau, Pierre-Marc Bureau, Joan Calvet, Alexis Dorais-Joncas, Marc-Étienne M.Léveillé, Benjamin Vanheuverzwijn, March, 2014
 +
* [http://blogs.technet.com/b/srd/archive/2014/03/24/security-advisory-2953095-recommendation-to-stay-protected-and-for-detections.aspx Security Advisory 2953095: recommendation to stay protected and for detections\, by Chengyun Chu, Elia Florio, March 24, 2014
  
[http://www.Matriux.com Official website]
+
=== Exploit Kit ===
 
+
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
[http://www.matriux.com/index.php?page=download Download Matriux OS]
+
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard, July 2, 2013
 
+
* [http://www.kahusecurity.com/2013/kore-exploit-kit/ Kore Exploit Kit], Kahu Security blog, July 18, 2013
[http://sourceforge.net/projects/matriux/ Matriux sourceforge]
+
 
+
[http://forum.matriux.com Support]
+
 
+
[http://matriux.com/index.php?page=art-de-matriux Artworks]
+
 
+
[http://www.chmag.in/articles/matriuxvibhag Matriux Tutorials]
+
  
IRC: irc://irc.freenode.net/matriux
+
=== Rootkit ===
 +
* [http://en.wikipedia.org/wiki/Rootkit Wikipedia: Rootkit]
 +
* [http://articles.forensicfocus.com/2013/11/22/understanding-rootkits/ Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection], by Dmitry Korolev, Yuri Gubanov, Oleg Afonin, November 22, 2013
  
 +
=== HackingTeam ===
 +
* [https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/ Police Story: Hacking Team’s Government Surveillance Malware], by Morgan Marquis-Boire, John Scott-Railton, Claudio Guarnieri, and Katie Kleemola, June 24, 2014
 +
* [http://www.securelist.com/en/blog/8231/HackingTeam_2_0_The_Story_Goes_Mobile HackingTeam 2.0: The Story Goes Mobile], Kaspersky Lab, June 24, 2014
 +
* [http://reverse.put.as/wp-content/uploads/2014/06/ShakaCon6-FuckYouHackingTeam.pdf Fuck you Hacking Team], by fG! at ShakaCon 2014, June 2014
  
  
[[Category:Linux]][[Category:Operating systems]][[Category:Live CD]]
+
[[Category:Malware]]

Revision as of 03:12, 5 July 2014

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

Rootkit

A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to an operating system.

See Also

External Links

Analysis

Exploit Kit

Rootkit

HackingTeam