Explore BrainMass
Share

Explore BrainMass

    Examples of threats, vulnerabilities, and exploits

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    You answered a previous posting today (attached answer). I was wondering if you could please help me again with a couple of questions.

    Is the DNS modification taking place on the user's system or actually on a DNS server?

    Do you know of any other 'modifications' it makes?

    © BrainMass Inc. brainmass.com October 9, 2019, 11:28 pm ad1c9bdddf
    https://brainmass.com/computer-science/program-execution/examples-threats-vulnerabilities-exploits-257606

    Attachments

    Solution Preview

    Hi,

    The trojan TROJ_JAHLAV.B will alter the DNS settings of the user's system.

    This results in the users surfing the ...

    Solution Summary

    This posting contains answers to the given questions. Examples of threats, vulnerabilities and exploits are determined.

    $2.19