Search results
Create the page "Exploit-based worms" on this wiki! See also the search results found.
- ...that allows attacks. The worm was designed to [[Vulnerability (computing)|exploit a security hole]] in the indexing software included as part of Microsoft's *[[Timeline of computer viruses and worms]]3 KB (388 words) - 16:19, 29 December 2024
- | exploit = ...[[Sven Jaschan]] of [[Germany]] confessed to have written these and other worms, such as [[Sasser (computer worm)|Sasser]].5 KB (611 words) - 10:43, 1 May 2025
- * Other activities based on the day of the month:<ref>{{cite web |title=CERT Advisory CA-2001-19: 'C ==Similar worms==7 KB (976 words) - 02:07, 15 April 2025
- ...rs from an exploit in WebDAV that [[Welchia]] used. (Welchia used the same exploit as MSBlast but had an additional method of propagation that was fixed in th ...own MSBlast. At the same time they also released a bulletin describing the exploit.<ref name="support.microsoft.com"/><ref>{{cite web |title=Flaw In Microsoft18 KB (2,516 words) - 11:58, 11 May 2025
- ...2711861|bibcode=2012RSPTA.370.3319M|issn=1364-503X|doi-access=free}}</ref> Worms almost always cause at least some harm to the network, even if only by cons ...r, as the [[Morris worm]] and [[Mydoom]] showed, even these "payload-free" worms can cause major disruption by increasing network traffic and other unintend24 KB (3,479 words) - 08:15, 25 May 2025
- ...after the arrest. It was the only variation that attempted to remove other worms from the infected computer, much in the way Netsky does. * [[Timeline of notable computer viruses and worms]]10 KB (1,420 words) - 12:02, 11 May 2025
- | exploit = The worm was based on proof of concept code demonstrated at the [[Black Hat Briefings]] by [[D11 KB (1,467 words) - 17:45, 19 October 2024
- Unlike [[computer virus]]es and [[Computer worm|worms]], trojans generally do not attempt to inject themselves into other files o ...jans have a relationship with worms, as they spread with the help given by worms and travel across the internet with them.<ref name="Bitdefender2009"/> BitD19 KB (2,505 words) - 14:43, 18 April 2025
- ...|last=Maynor|first=David|title=Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research|url=https://books.google.com/books? ...he virus from each installation was in the range of $200–$53,000. Possibly based on these numbers, Stoll, a [[systems administrator]] known for discovering14 KB (2,061 words) - 13:58, 18 May 2025
- Exploiting the behavior of a buffer overflow is a well-known [[security exploit]]. On many systems, the memory layout of a program, or the system as a whol {{further|topic=stack-based overflows|Stack buffer overflow}}46 KB (6,706 words) - 08:55, 25 May 2025
- ...rst3=Lidong |last4=He |first4=Longtao |date=2016 |title=Information fusion-based method for distributed domain name system cache poisoning attack detection ...m a [[cache poisoning]] attack, the attacker [[Exploit (computer security)|exploit]]s flaws in the DNS software. A server should correctly validate DNS respo13 KB (1,816 words) - 21:37, 25 May 2025
- {{distinguish|Timeline of computer viruses and worms}} ...a name is attached to the virus. Since anti-virus software compete partly based on how quickly they react to the new threat, they usually study and name th17 KB (2,272 words) - 18:58, 11 January 2025
- .../ref> help detect and inhibit the action of such [[malware]]. An [[anomaly-based intrusion detection system]] may also monitor the network like wireshark [[ ...y resources are studied during and after an attack to keep an eye on new [[Exploit (computer security)|exploitation]] techniques. Such analysis may be used to13 KB (1,679 words) - 09:07, 22 March 2025
- ...irst version of NOD32 {{En dash}} called NOD-ICE {{En dash}} was a [[DOS]]-based program. It was created in 1987 by Miroslav Trnka and Peter Paško at the t ...popularity with IT workers in Eastern European countries, as [[ESET]] was based in Slovakia. Though the program's abbreviation was originally pronounced as21 KB (2,922 words) - 05:29, 18 May 2025
- Some Linux users do run Linux-based anti-virus software to scan insecure documents and email which comes from o ...r example, the open source [[Clam AntiVirus|ClamAV]] "Detects ... viruses, worms and trojans, including Microsoft Office macro viruses, [[mobile malware]],58 KB (7,551 words) - 15:41, 27 May 2025
- ...because of their exploitation by [[Spamming|spammers]] and [[computer worm|worms]]. Many relays were closed, or were placed on [[blacklist (computing)|black ...rd party e-mail servers to avoid detection<ref name="wired_pass" /> and to exploit the additional resources of these open relay servers. Spammers would send o14 KB (2,072 words) - 13:43, 7 August 2024
- ...-site scripting attacks use known vulnerabilities in [[Web application|web-based applications]], their [[Server (computing)|servers]], or the plug-in system ...ps://www.theguardian.com/technology/blog/2010/sep/21/twitter-bug-malicious-exploit-xss |date= September 21, 2010 |newspaper= The Guardian |access-date= Septem32 KB (4,609 words) - 21:38, 25 May 2025
- The [[classic Mac OS]] disposed of filename-based extension metadata entirely; it used, instead, a distinct file [[type code] ...[[heuristic]]. They choose the application to launch when a file is opened based on that media type, reducing the dependency on filename extensions. [[macOS20 KB (3,166 words) - 20:47, 24 May 2025
- ...are into one or more sub-types (i.e. [[computer virus]]es, [[Computer worm|worms]], [[Trojan horse (computing)|Trojan horses]], [[logic bomb]]s, [[ransomwar ...Luo|first5=Min|date=2020-03-21|title=A Novel Malware Classification Method Based on Crucial Behavior|journal=Mathematical Problems in Engineering|volume=20276 KB (10,214 words) - 21:44, 23 May 2025
- ...Taxonomy of Replicators}}</ref> has begun to categorize replicators, often based on the amount of support they require. [[File:A rep-tile-based setiset of order 4.png|thumb|right|text-bottom|290px|A perfect [[Self-tilin25 KB (3,438 words) - 20:31, 17 April 2025