Skip to content

Penetration Testing

  • Home
  • Forensics
  • Machine Learning
  • Malware Analysis
  • Networking
  • Network PenTest
    • Information Gathering
    • Vulnerability Analysis
    • Exploitation
      • Metasploit
    • Post Exploitation
    • Maintaining Access
    • Password Attacks
    • Sniffing & Spoofing
    • Smartphone PenTest
    • Wireless
  • Reverse Engineering
  • Programming
  • Technique
  • Web PenTest
    • Web Information Gathering
    • Web Vulnerability Analysis
    • Web Exploitation
    • Web Maintaining Access
    • Reporting
  • Home
  • Forensics
  • Machine Learning
  • Malware Analysis
  • Networking
  • Network PenTest
    • Information Gathering
    • Vulnerability Analysis
    • Exploitation
      • Metasploit
    • Post Exploitation
    • Maintaining Access
    • Password Attacks
    • Sniffing & Spoofing
    • Smartphone PenTest
    • Wireless
  • Reverse Engineering
  • Programming
  • Technique
  • Web PenTest
    • Web Information Gathering
    • Web Vulnerability Analysis
    • Web Exploitation
    • Web Maintaining Access
    • Reporting

Penetration Testing

  • Technique

The most common types of virus

by do son · Published January 27, 2017 · Updated May 5, 2017

A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.
When the virus is executed, it spreads by copying itself into or over data files, programs, or boot sector of a computer’s hard drive, or potentially anything else writable. To help spread an infection the virus writers use detailed knowledge of security vulnerabilities, zero days, or social engineering to gain access to a host’s computer.

The most common types of virus:

  • Invasive virus:Can replace itself with some modules or stack areas in the normal program. Therefore, these viruses only attack some specific procedures, targeted. Under normal circumstances difficult to find, remove them more difficult.

     

  • Embedded virus:The virus will own code embedded in the infected file, when the file is infected, killing and removal of the virus are very easy. However, the preparation of embedded virus more difficult, so the number of small viruses.

     

  • Shell-like virus:The virus will own code attached to the head or tail of the normal procedure. A wide variety of such viruses, most of the virus infected files are of this type.

     

  • Virus generation tools:Usually driven by the form of a menu, as long as people have a little computer knowledge, the use of virus generation tools can be as easy as a la carte to create a computer virus, and can design a very complex with theft and pleomorphic characteristics of the virus.
  • DOS virusThis category is for viruses that run under the DOS Operating system.

Share

Tags: DOS virusEmbedded virusInvasive virusmalwareShell-like virusvirus

Follow:

  • Next story What is ARP spoofing attack?
  • Previous story HoneyPot & HoneyNet: Virtual attack and defense system

Search




Reward

Brilliantly

SAFE!


securityonline.info

Content & Links

Verified by Sur.ly

2022

Popular Tags

  • active directory android Android P Apple backdoor Bitcoin Brute Force BurpSuite bypass av bypass waf Cross-Site Scripting CSRF facebook google google chrome hacker hashcat kali linux Linux malware metasploit nmap OSINT penetration testing pentest Pentesting php webshell powershell privilege escalation Programming Python shodan sqli sql injection sqlmap ssh Ubuntu Vulnerability web app webapp pentest webshell windows wireless wordpress XSS
screen recorder

Link
Best webcam software

  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • DMCA NOTICE

Penetration Testing © 2022. All Rights Reserved.