[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Malicious software masquerading as a server

Posted on 2014-04-14
2
Medium Priority
?
343 Views
Last Modified: 2014-04-15
In my reading, apparently some apps may masquerade as a real server, and engate in handshaking to aquire pw, etcs

What is the name for such an attack
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 31

Assisted Solution

by:Gareth Gudger
Gareth Gudger earned 1000 total points
ID: 39999843
Anything that tries to steal key strokes or passwords is normally called a KeyLogger.

A type of attach that captures and replays transmissions is a Man In The Middle Attack.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 1000 total points
ID: 39999894
Man-in-the-middle as stated above, maybe even watering-hole attacks, however there are other attacks, and some are just shady practices as well:

Some software uses "idle" cycles of your computer to spider websites so that it's harder to block, but they provide fully functioning software, with a little "trojan" lying in wait.
http://www.webmasterworld.com/search_engine_spiders/3986022.htm

Trojan/Keylogger
http://blog.avast.com/2014/01/27/malformed-filezilla-ftp-client-with-login-stealer/
Works like filezilla does, but also send your pwd to the bad guys.
-rich
0

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
Native ability to set a user account password via AD GPO was removed because the passwords can be easily decrypted by any authenticated user in the domain. Microsoft recommends LAPS as a replacement and I have written an article that does something …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

613 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question