System information

Threats to computer security 27
TYPE
NAME
DESCRIPTION
Exploit
Exploits
Exploit is a set of data or a program code
used application's vulnerabilities procecced
to perfom a malicious action on the
computer. For example, exploits can write
or read files or access "infected" web
pages.
Different exploits use vulnerabilities of
different applications or network services.
An exploit is transferred via the network to
multiple computers in the form of a network
packet searching for computers with
vulnerable network services. Exploit
contained in a DOC file uses vulnerabilities
of text editors. It can start perform functions
programmed by the intruder when the user
opens an infected file. An exploit contained
in an e-mail message searches for
vulnerabilities in e-mail client programs; it
can start performing its malicious action as
soon as the user opens an infected
message in this program.
Exploits are used to distribute net worms
(Net-Worm). Exploits-Nukers are network
packets that make computers inoperative.
FileCryptors
File Cryptors
File cryptors decrypt other malicious
programs in order to hide them from anti-
virus applications.