Solved

Malicious software masquerading as a server

Posted on 2014-04-14
2
323 Views
Last Modified: 2014-04-15
In my reading, apparently some apps may masquerade as a real server, and engate in handshaking to aquire pw, etcs

What is the name for such an attack
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 31

Assisted Solution

by:Gareth Gudger
Gareth Gudger earned 250 total points
ID: 39999843
Anything that tries to steal key strokes or passwords is normally called a KeyLogger.

A type of attach that captures and replays transmissions is a Man In The Middle Attack.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 39999894
Man-in-the-middle as stated above, maybe even watering-hole attacks, however there are other attacks, and some are just shady practices as well:

Some software uses "idle" cycles of your computer to spider websites so that it's harder to block, but they provide fully functioning software, with a little "trojan" lying in wait.
http://www.webmasterworld.com/search_engine_spiders/3986022.htm

Trojan/Keylogger
http://blog.avast.com/2014/01/27/malformed-filezilla-ftp-client-with-login-stealer/
Works like filezilla does, but also send your pwd to the bad guys.
-rich
0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringin…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now