Attack Types Flashcards
IOC - Define
Indicator of Compromise
Virus
Malicious Code that requires user interaction to install and replicate.
Crypto-malware/Ransomware
Malicious applications that scare or scam users into paying money or granting access.
Trojan/RAT
Friendly software that contains malicious software.
Worms
Self replicating program without user interaction
Network Service Worms
Worm that exploits a network
Mass Mailing Worms
Work that spreads thorugh email
PUP
Potentially Unwanted Program which tend to be adware or spyware.
Fileless Virus
Malware that operates in memory. Hooks in through Powershell or WMI
Botnet
Malicious Code that infects a large number of hosts
Logic Bomb
Malicious code that triggers after a specific time or on a date or after a specific activity etc
Empire, PowerSploit, MetaSploit, Cobalt Strike
Fileless Attack Framework
Spyware
Malicious software that collects user activity and reports back
Keylogger
Malicious code that collects all keystrokes
Rootkits
Malicious code that installs at the OS or Kernal level