Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Description" with value "DDoS by GET flood". Since there have been only a few results, also nearby values are displayed.

Showing below up to 39 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Bandwidth flood  + (DDoS feature)
    • Layer 7 attack  + (DDoS feature)
    • Debugging detection  + (Detecting debugging features (debug, winpcap, ...))
    • Virtual machine detection  + (Detection of virtual environments or methods to circumvent automated analyses in sandboxes.)
    • MSN vector  + (Distribution du botnet/malware par MSN)
    • USB vector  + (Distribution du botnet/malware par périphérique (clé) USB)
    • Social network vector  + (Distribution par les réseaux sociaux)
    • Removable drive vector  + (Distribution via removable drives)
    • Phone home  + (Documented feature where the malware contacts the command and control mechanism to ping it and expect commands (all botnets have that feature, thus it is interesting to mention it if it is documented in one of the attached publications))
    • Uninstall  + (Désinstallation de malwares non affiliés ou plus exploités)
    • Web server  + (Détournement de la machine victime comme serveur Web)
    • Encrypt MFT  + (Encrypt the master file table (Microsoft Windows NTFS))
    • Run commands  + (Exécution de commandes)
    • Fast flux  + (Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.)
    • File download  + (File download and install / execute)
    • GRE flood  + (Generic routing encapsulation)
    • SPDY grabbing  + (Grabbing of SPDY session content.)
    • IoT  + (Internet of Things assets (cameras, home appliances, ...))
    • Spying  + (Involves RATs and Rootkits)
    • Logging  + (Logging information is sent to the C&C)
    • Mailslot  + (Mailslots are an IPC mechanism allowing multiple clients to send messages to a server.)
    • Memory scrapping  + (Memory scrapping (for passwords, credit card data,...))
    • Update  + (Mise à jour du malware grâce au botnet)
    • Startpage modification  + (Modification of the browser's start page)
    • Camera capture  + (Monitor camera activity)
    • Microphone capture  + (Monitor microphone (sound) activity)
    • Premium services  + (Other premium rate services (such as pay per view videos, games...).)
    • Hosts modification  + (Part of the Pharming process)
    • Point-of-sale  + (Point-of-sale botnets: target credit card and other personal data on POS terminals.)
    • MIRC  + (Popular IRC software, sometimes used as basis for IRC malware construction.)
    • Shared drive vector  + (Propagates through shared drive / network share)
    • Bitcoin payment  + (Proposes a Bitcoin payment as a method to collect a ransom (or fake fine).)
    • RAT  + (Remote administration trojans)
    • SOCKS  + (SOCKS proxy)
    • Pop-up  + (Show a pop-up message on the victims' computers)
    • Store data in ADS  + (Store data in NTFS Alternate data streams)
    • COVID-19 pandemic  + (The 2019/2020 COVID-19 coronavirus pandemic resulted in a number of related or co-occurring attacks and malware operations)
    • Server-side polymorphism  + (The code that operates the mutation is on a dedicated server.)