Skip to main content

Questions tagged [infection-vector]

Infection vectors are methods and channels used by attackers to infect computer systems.

1 vote
0 answers
229 views

The answer and comments to this earlier question of mine have made it pretty clear that the firmware of a USB drive can be modified via the USB interface (thus merely plugging it into an infected ...
NikS's user avatar
  • 379
0 votes
1 answer
539 views

Can a "clean" USB flash storage drive firmware become infected simply by plugging it into an infected computer? And if so, how exactly could that happen? It seems like it shouldn't be ...
NikS's user avatar
  • 379
5 votes
3 answers
2k views

Can my laptop be infected via Bluetooth? Just by having Bluetooth on, is that possible?
John Doe's user avatar
1 vote
1 answer
180 views

Running the following code on a linux machine returns the partition tables and partial config of the hard-drive and USB devices. fdisk -l returns Disk /dev/nvme0n1: 238.47 GiB, 256060514304 bytes, ...
Marshall's user avatar
-1 votes
1 answer
172 views

Suppose you have a target machine (desktop, smartphone, server) and that you have any needed knowledge about the target machine to perform the following task. Is it possible to infect given machine ...
Konstei's user avatar
0 votes
1 answer
478 views

Suppose malware lands and executes on a computer. Could this malware attempt to spread further by writing itself to data files (images, pdfs, docs) and hoping that the owner would transfer or upload ...
ales1265's user avatar
0 votes
0 answers
55 views

My computer probably had malware. Decided to install linux and do a disc wipe using a linux distro called Pop!_OS (ubuntu based) Can a piece of malware/virus inject itself into an ISO According to the ...
user avatar
0 votes
1 answer
3k views

If I move a malicious file to Google drive, can my other files there get infected? Or can my google account itself get compromised?
user avatar
0 votes
1 answer
1k views

My computer (probably) had malware, and during that time I connected my phone to it (via USB) for transferring files, using as midi, etc. Is there a chance the malware could've spread from the ...
user avatar
1 vote
2 answers
2k views

Compared to a DVD live Tails Linux, how unsafe is using the USB version? I'm trying to help a friend who for years has been mired in the laborious iterative process of remastering their own DVDs of ...
GGibson's user avatar
  • 113
0 votes
1 answer
301 views

This is about a PHP7.4 based shopping platform (opencart (v3.0)). For testing purposes I had a dummy set up at site.com/xyz. The admin page of that was site.com/xyz/admin. The login and pw for the ...
ahron's user avatar
  • 423
2 votes
5 answers
2k views

Let's say I know that there is a computer than is heavily infested with viruses (but I do not know which kind of viruses) and needs to be nuked from orbit. And on that computer is a very important ...
Quillion's user avatar
  • 1,134
1 vote
2 answers
251 views

To ease tracking replies and bounces, we send automated emails such as - order confirmations, password recovery, etc with a unique sender address typically like this FROM sup-[custno]-[invno]-[hash]@...
Lenne's user avatar
  • 229
3 votes
2 answers
483 views

I chose that title, but there are probably several ways to ask this question. It's all about understanding how a computer (especially desktop, but you could generalize this to servers I guess) can get ...
reed's user avatar
  • 16k
2 votes
2 answers
13k views

Is it possible for a computer to be infected by viewing the link to a PDF file without downloading it? For example, if I opened a link on a website such as www.wordpress.com/somepdfFile.pdf (not a ...
Lone Ronin's user avatar

15 30 50 per page