Solved

Malicious software masquerading as a server

Posted on 2014-04-14
2
328 Views
Last Modified: 2014-04-15
In my reading, apparently some apps may masquerade as a real server, and engate in handshaking to aquire pw, etcs

What is the name for such an attack
0
Comment
Question by:Anthony Lucia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 31

Assisted Solution

by:Gareth Gudger
Gareth Gudger earned 250 total points
ID: 39999843
Anything that tries to steal key strokes or passwords is normally called a KeyLogger.

A type of attach that captures and replays transmissions is a Man In The Middle Attack.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 39999894
Man-in-the-middle as stated above, maybe even watering-hole attacks, however there are other attacks, and some are just shady practices as well:

Some software uses "idle" cycles of your computer to spider websites so that it's harder to block, but they provide fully functioning software, with a little "trojan" lying in wait.
http://www.webmasterworld.com/search_engine_spiders/3986022.htm

Trojan/Keylogger
http://blog.avast.com/2014/01/27/malformed-filezilla-ftp-client-with-login-stealer/
Works like filezilla does, but also send your pwd to the bad guys.
-rich
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question