About: Webattacker     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : yago:Feat100036762, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FWebattacker

Webattacker is a do-it-yourself malware creation kit that includes scripts that simplify the task of infecting computers and spam-sending techniques to lure victims to specially rigged Websites. It was allegedly created by a group of Russian programmers. The kit demands minimal technical sophistication to be manipulated and used by crackers. The exploitation process usually consists of the following steps: The software appears to be updated regularly to exploit new flaws, such as the flaw discovered in September 2006 in how Internet Explorer handles certain graphics files.

AttributesValues
rdf:type
rdfs:label
  • Webattacker
rdfs:comment
  • Webattacker is a do-it-yourself malware creation kit that includes scripts that simplify the task of infecting computers and spam-sending techniques to lure victims to specially rigged Websites. It was allegedly created by a group of Russian programmers. The kit demands minimal technical sophistication to be manipulated and used by crackers. The exploitation process usually consists of the following steps: The software appears to be updated regularly to exploit new flaws, such as the flaw discovered in September 2006 in how Internet Explorer handles certain graphics files.
foaf:isPrimaryTopicOf
dct:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
sameAs
has abstract
  • Webattacker is a do-it-yourself malware creation kit that includes scripts that simplify the task of infecting computers and spam-sending techniques to lure victims to specially rigged Websites. It was allegedly created by a group of Russian programmers. The kit demands minimal technical sophistication to be manipulated and used by crackers. Sophos has reported that WebAttacker is being sold at some hacker Web sites or through a network of individual resellers and includes technical support. The malware code is currently being delivered in at least seven exploits, including threats aimed at Microsoft's MDAC software, Mozilla's Firefox Web browser and Sun Microsystems's Java virtual machine programs. The exploitation process usually consists of the following steps: * Establishment of a malicious website though automated tools provided by WebAttacker * Sending mass email (otherwise known as spam) inviting the recipient to visit the website under various pretenses * Infecting the visitor's computer with a Trojan by exploiting numerous vulnerabilities * Using the Trojan to run arbitrary executables on the infected PC which are typically designed to extract passwords, personal information, keystroke logging, or taking general control over the compromised computer The software appears to be updated regularly to exploit new flaws, such as the flaw discovered in September 2006 in how Internet Explorer handles certain graphics files.
prov:wasDerivedFrom
page length (characters) of wiki page
is foaf:primaryTopic of
is Link from a Wikipage to another Wikipage of
is Wikipage redirect of
Faceted Search & Find service v1.17_git51 as of Sep 16 2020


Alternative Linked Data Documents: PivotViewer | iSPARQL | ODE     Content Formats:       RDF       ODATA       Microdata      About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3319 as of Dec 29 2020, on Linux (x86_64-centos_6-linux-glibc2.12), Single-Server Edition (61 GB total memory)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2021 OpenLink Software