Analýza vektorů infekce malwaru

Abstract

The work is aimed at comparison of various operating system infection vectors using malicious code. It deals with three infection vectors in detail - BadUSB, Microsoft Office Word add-ins and phishing methods. These vectors were described in scope of the work and their functionality was demonstrated on examples. Furthermore, advantages and disadvantages were described of mentioned infection vectors. There are general recommendations, which may reduce the risk of attack using common infection vectors. Working samples presenting selected infection vectors in practice were created in practical scope of the work.

Description

Subject(s)

malware infection, malicious, BadUSB, Microsoft Office add-ins, VSTO, Office JavaScript API, phishing

Citation