Script-based injection uses scripts embedded in documents as email attachments; which option describes this approach?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Script-based injection uses scripts embedded in documents as email attachments; which option describes this approach?

Explanation:
Script-based injection focuses on delivering malicious code through scripts embedded in documents or email attachments that run when the user opens the file. The attacker relies on these embedded scripts (like macros or JavaScript) to execute commands, download payloads, or establish a foothold on the system. This fits the scenario of scripts embedded in documents attached to emails, making it the best descriptor. File-based malware would rely on actual executable files stored on disk that the user runs or that drop onto the system. Fileless malware operates without leaving persistent files on disk, often running entirely in memory using tools like PowerShell or WMI. Legitimate applications are benign and not about delivering malicious scripts via attachments.

Script-based injection focuses on delivering malicious code through scripts embedded in documents or email attachments that run when the user opens the file. The attacker relies on these embedded scripts (like macros or JavaScript) to execute commands, download payloads, or establish a foothold on the system. This fits the scenario of scripts embedded in documents attached to emails, making it the best descriptor.

File-based malware would rely on actual executable files stored on disk that the user runs or that drop onto the system. Fileless malware operates without leaving persistent files on disk, often running entirely in memory using tools like PowerShell or WMI. Legitimate applications are benign and not about delivering malicious scripts via attachments.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy