Search by property

Jump to navigation Jump to search

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of all pages that have property "Description" with value "Encrypt the master file table (Microsoft Windows NTFS)". Since there have been only a few results, also nearby values are displayed.

Showing below up to 27 results starting with #1.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

    • Encrypt MFT  + (Encrypt the master file table (Microsoft Windows NTFS))
    • Run commands  + (Exécution de commandes)
    • Fast flux  + (Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.)
    • File download  + (File download and install / execute)
    • GRE flood  + (Generic routing encapsulation)
    • SPDY grabbing  + (Grabbing of SPDY session content.)
    • IoT  + (Internet of Things assets (cameras, home appliances, ...))
    • Spying  + (Involves RATs and Rootkits)
    • Logging  + (Logging information is sent to the C&C)
    • Mailslot  + (Mailslots are an IPC mechanism allowing multiple clients to send messages to a server.)
    • Memory scrapping  + (Memory scrapping (for passwords, credit card data,...))
    • Update  + (Mise à jour du malware grâce au botnet)
    • Startpage modification  + (Modification of the browser's start page)
    • Camera capture  + (Monitor camera activity)
    • Microphone capture  + (Monitor microphone (sound) activity)
    • Premium services  + (Other premium rate services (such as pay per view videos, games...).)
    • Hosts modification  + (Part of the Pharming process)
    • Point-of-sale  + (Point-of-sale botnets: target credit card and other personal data on POS terminals.)
    • MIRC  + (Popular IRC software, sometimes used as basis for IRC malware construction.)
    • Shared drive vector  + (Propagates through shared drive / network share)
    • Bitcoin payment  + (Proposes a Bitcoin payment as a method to collect a ransom (or fake fine).)
    • RAT  + (Remote administration trojans)
    • SOCKS  + (SOCKS proxy)
    • Pop-up  + (Show a pop-up message on the victims' computers)
    • Store data in ADS  + (Store data in NTFS Alternate data streams)
    • COVID-19 pandemic  + (The 2019/2020 COVID-19 coronavirus pandemic resulted in a number of related or co-occurring attacks and malware operations)
    • Server-side polymorphism  + (The code that operates the mutation is on a dedicated server.)