Reference Guide

Security Management Server v10.2.7 AdminHelp
43
removal by administrators or security technologies.
Trojan
Malware that disguises itself as a legitimate program or
file.
Zeus
Virus
Malware that propagat
es by inserting or appending itself to
other files.
Sality, Virut
Worm
Malware that propagates by copying itself to another
device.
Code Red,
Stuxnet
Dual Use
Dual Use indicates the file can be used for malicious and non-malicious purposes. Caution should be
used when allowing the use of these files in your organization. For example, while PsExec can be a
useful tool for executing processes on another system, that same benefit can be used to execute
malicious files on another system.
Subclass
Definition
Examples
Crack
Technologies that can alter (or crack) another
application to bypass licensing limitations or Digital
Rights Management protection (DRM).
Generic
Any Dual Use tool that does not fit into an existing
category.
KeyGen
Technologies which can generate or recover/reveal
product keys that can be used to bypass Digital Rights
Management (DRM) or licensing protection of software
and other digital media.
MonitoringTool
Technologies that track a user's online activities without
awareness of the user by logging and possibly
transmitting logs of one or more of the following:
user keystrokes
email messages
chat and instant messaging
web browsing activity
screenshot captures
application usage
Veriato 360,
Refog
Keylogger
Pass Crack
Technologies that can reveal a password or other
sensitive user credentials either by cryptographically
reversing passwords or by revealing stored passwords.
l0phtcrack, Cain
& Abel
RemoteAccess
Technologies that can access another system remotely
and administer commands on the remote system, or
monitor user activities without user notification or
consent.
Putty, PsExec,
TeamViewer
Tool
Programs that offer administrative features but can be
used to facilitate attacks or intrusions.
Nmap, Nessus,
P0f
Potentially Unwanted Programs