BIOS rootkit A BIOS rootkit is programming that exists in a system's memory hardware to enable remote administration. BIOS rootkit은 원격 관리를 활성화 하기 위해 시스템 메모리의 하드웨어에 있는 프로그램입니다. Rootkits may be installed for legitimate purposes, such as digital rights management (DRM) or data or device security but they may also be targets for persistent attacks. 루트킷은 DRM(디지털 권한 관리) 또는 데이터 또는 장치 보안과 같은 합법적인 목적으로 설..
Adware Adware is any software application in which advertising banners are displayed while a program is running. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Adware is commonly created for computers, but may also be found on mobile devices. 애드웨어는 프로그램이 운영되는 동안 배너가 표시되는 모든 소프트웨어 애플리케이션입니다. 광고는 프로그램의 사용자 인터페이스에 나타나는 팝업 창이나 표시줄을 통해 제공됩니다. 애드웨어는 일..
email spam Email spam, also known as junk email, is unsolicited bulk messages sent through email. The use of spam has been growing in popularity since the early 1990s and is a problem faced by most email users. Recipients of spam often have had their email addresses obtained by spambots, which are automated programs that crawl the internet looking for email addresses. Spammers use spambots to cr..
Hand of Thief Hand of Thief is banking crimeware that targets Linux operating systems. The Hand of Thief uses a form grabber to steal IDs, passwords and other information pertaining to Internet banking. The crimeware detects Internet banking information while the user enters it into a browser form, capturing it along with identifying data and storing it in a MySQL database. Thief Hand는 Linux 운영 ..
backdoor(computing) A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms. 백도어는 시스템의 일반적인 보안 메커니즘을 우회하여 암호화된 데이터나 시스템에 액세스 하는 수단입니다. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes. However, attackers often use backdoors that they detect or ins..
Mobile Device Attack A mobile device attack is an exploit targeting handheld communications devices, such as smartphones and tablets. 모바일 장치 공격은 스마트폰 및 태블릿과 같은 핸드 헬드 통신 장치를 대상으로 하는 공격입니다. Ed Skoudis, founder and senior security consultant of InGuardians, a security consulting firm, describes one scenario: "Bad guys are going to the Android Marketplace, pulling down an app, building a backdoor in..
IP Spoofing IP spoofing, also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a Web site, hijack browsers, or gain access to a network. Here's how it works: The hijacker obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the sour..
- Total
- Today
- Yesterday
- 멀웨어
- IP Spoofing
- #예선
- Backdoor
- 서버
- 리눅스
- 보안
- 립케알
- #NYPC
- 기본정보
- #개발
- Security
- #프로그래밍
- 생활코딩
- spyware
- 리버싱
- writeup
- adware
- Mobile Attack
- reversing.kr
- #고딩
- CentOS
- 리눅스서버
- #C언어
- spam
- reversing
- #2016
- 스파이웨어
- Hand of Thief
- Malware
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | ||||
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |