The IT Law Wiki

Attacker tools

31,971pages on
this wiki

Definition Edit

As part of a malware infection or other system compromise, various types of attacker tools might be delivered to a system. These tools, which are forms of malware, allow attackers to have unauthorized access to or use of infected systems and their data, or to launch additional attacks.

Overview Edit

When transferred by other malware, attacker tools can be delivered as part of the malware itself, (e.g., in a Trojan horse) or delivered after an infection occurs. For example, a worm-infected system might be directed by the worm to contact a particular malicious website, download tools from that site, and install them on the system.

Around Wikia's network

Random Wiki