Skip to content

Penetration Testing

  • Home
  • Forensics
  • Machine Learning
  • Malware Analysis
  • Networking
  • Network PenTest
    • Information Gathering
    • Vulnerability Analysis
    • Exploitation
      • Metasploit
    • Post Exploitation
    • Maintaining Access
    • Password Attacks
    • Sniffing & Spoofing
    • Smartphone PenTest
    • Wireless
  • Reverse Engineering
  • Programming
  • Technique
  • Web PenTest
    • Web Information Gathering
    • Web Vulnerability Analysis
    • Web Exploitation
    • Web Maintaining Access
    • Reporting
  • Home
  • Forensics
  • Machine Learning
  • Malware Analysis
  • Networking
  • Network PenTest
    • Information Gathering
    • Vulnerability Analysis
    • Exploitation
      • Metasploit
    • Post Exploitation
    • Maintaining Access
    • Password Attacks
    • Sniffing & Spoofing
    • Smartphone PenTest
    • Wireless
  • Reverse Engineering
  • Programming
  • Technique
  • Web PenTest
    • Web Information Gathering
    • Web Vulnerability Analysis
    • Web Exploitation
    • Web Maintaining Access
    • Reporting

Penetration Testing

  • Technique

The most common types of virus

by do son · Published January 27, 2017 · Updated May 5, 2017

A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.
When the virus is executed, it spreads by copying itself into or over data files, programs, or boot sector of a computer’s hard drive, or potentially anything else writable. To help spread an infection the virus writers use detailed knowledge of security vulnerabilities, zero days, or social engineering to gain access to a host’s computer.

The most common types of virus:

  • Invasive virus:Can replace itself with some modules or stack areas in the normal program. Therefore, these viruses only attack some specific procedures, targeted. Under normal circumstances difficult to find, remove them more difficult.

     

  • Embedded virus:The virus will own code embedded in the infected file, when the file is infected, killing and removal of the virus are very easy. However, the preparation of embedded virus more difficult, so the number of small viruses.

     

  • Shell-like virus:The virus will own code attached to the head or tail of the normal procedure. A wide variety of such viruses, most of the virus infected files are of this type.

     

  • Virus generation tools:Usually driven by the form of a menu, as long as people have a little computer knowledge, the use of virus generation tools can be as easy as a la carte to create a computer virus, and can design a very complex with theft and pleomorphic characteristics of the virus.
  • DOS virusThis category is for viruses that run under the DOS Operating system.

Share

Tags: DOS virusEmbedded virusInvasive virusmalwareShell-like virusvirus

  • Next story What is ARP spoofing attack?
  • Previous story HoneyPot & HoneyNet: Virtual attack and defense system

Follow:

Search




Reward

Brilliantly

SAFE!


securityonline.info

Content & Links

Verified by Sur.ly

2022

Technology News

  • SEMI predicts a 22% decline in global Fab equipment spending in 2023, with a recovery expected in 2024
  • Intel appoints Stuart Pann as the new head of the Foundry Services Department
  • Ubisoft announces the launch of an artificial intelligence tool called Ghostwriter
  • ID@Xbox bring over 3,000 games to Xbox, and paid out more than $4 billion to developers
  • NVIDIA joins forces with TSMC and other partners to integrate AI technology into the 2nm process
screen recorder

  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • DMCA NOTICE

Penetration Testing © 2023. All Rights Reserved.