log wiper

2024-08-19

A log wiper is anti-forensics malware that alters, obscures, or removes entries from log files that may provide forensic evidence to an intrusion.

Read More

Secure Sockets Layer

2024-08-19

Secure Sockets Layer is a deprecated technology used to establish encrypted links between a client and server.

Read More

sniffer

2024-08-19

A packet analyzer (also packet sniffer, network analyzer, or simply “sniffer”) is a computer program or hardware that can analyze and log ...

Read More

UuidFromStringA

2024-08-19

UuidFromStringA is a WinAPI that converts strings into a UUID.

UuidFromStringA is defined in rpcdce.h ...

Read More

Virtual Machine

2024-08-19

A Virtual Machine (VM) is a software-based computer that behaves as if it were a physical computer.

Read More

visibility

2024-08-19

Visibility in a cybersecurity and systems administration context is the degree of which an organization is able to observe and understand events that ...

Read More

vulnerability

2024-08-19

A vulnerability is a weakness that can be exploited.

Read More

/dev/tcp

2024-08-18

The bash shell provides a special file /dev/tcp that allows a user to establish network connections in a similar manner to Netcat. ...

Read More

anti-virus

2024-08-18

Antivirus (AV) software is a computer program intended to detect, prevent, and remove malware.

Read More

command and control

2024-08-18

In a malware context. Command and Control (C2) is a collection of methods and software used to communicate with and control infected hosts.

Many C2 ...

Read More