Solved

Malicious software masquerading as a server

Posted on 2014-04-14
2
325 Views
Last Modified: 2014-04-15
In my reading, apparently some apps may masquerade as a real server, and engate in handshaking to aquire pw, etcs

What is the name for such an attack
0
Comment
Question by:Anthony Lucia
2 Comments
 
LVL 31

Assisted Solution

by:Gareth Gudger
Gareth Gudger earned 250 total points
ID: 39999843
Anything that tries to steal key strokes or passwords is normally called a KeyLogger.

A type of attach that captures and replays transmissions is a Man In The Middle Attack.
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 39999894
Man-in-the-middle as stated above, maybe even watering-hole attacks, however there are other attacks, and some are just shady practices as well:

Some software uses "idle" cycles of your computer to spider websites so that it's harder to block, but they provide fully functioning software, with a little "trojan" lying in wait.
http://www.webmasterworld.com/search_engine_spiders/3986022.htm

Trojan/Keylogger
http://blog.avast.com/2014/01/27/malformed-filezilla-ftp-client-with-login-stealer/
Works like filezilla does, but also send your pwd to the bad guys.
-rich
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question