log wiper
2024-08-19
A log wiper is anti-forensics malware that alters, obscures, or removes entries from log files that may provide forensic evidence to an intrusion.
Read More
Secure Sockets Layer
2024-08-19
Secure Sockets Layer is a deprecated technology used to establish encrypted links between a client and server.
Read More
sniffer
2024-08-19
A packet analyzer (also packet sniffer, network analyzer, or simply “sniffer”) is a computer program or hardware that can analyze and log ...
Read More
UuidFromStringA
2024-08-19
UuidFromStringA is a WinAPI that converts strings into a UUID.
UuidFromStringA is defined in rpcdce.h ...
Read More
Virtual Machine
2024-08-19
A Virtual Machine (VM) is a software-based computer that behaves as if it were a physical computer.
Read More
visibility
2024-08-19
Visibility in a cybersecurity and systems administration context is the degree of which an organization is able to observe and understand events that ...
Read More
vulnerability
2024-08-19
A vulnerability is a weakness that can be exploited.
Read More
/dev/tcp
2024-08-18
The bash shell provides a special file /dev/tcp that allows a user to establish network connections in a similar manner to Netcat. ...
Read More
anti-virus
2024-08-18
Antivirus (AV) software is a computer program intended to detect, prevent, and remove malware.
Read More
command and control
2024-08-18
In a malware context. Command and Control (C2) is a collection of methods and software used to communicate with and control infected hosts.
Many C2 ...
Read More