The IT Law Wiki

Attacker tools

32,062pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

As part of a malware infection or other system compromise, various types of attacker tools might be delivered to a system. These tools, which are forms of malware, allow attackers to have unauthorized access to or use of infected systems and their data, or to launch additional attacks.

Overview Edit

When transferred by other malware, attacker tools can be delivered as part of the malware itself, (e.g., in a Trojan horse) or delivered after an infection occurs. For example, a worm-infected system might be directed by the worm to contact a particular malicious website, download tools from that site, and install them on the system.

Also on Fandom

Random Wiki