What is the browser-based attack that runs malicious code inside the browser and persists even after closing or navigating away from the malicious web page called?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

What is the browser-based attack that runs malicious code inside the browser and persists even after closing or navigating away from the malicious web page called?

Explanation:
This question is about browser-based persistence where malicious code runs inside the browser and continues to operate even after you close the page or navigate away. That behavior is described by MarioNet, a term used for a browser-based botnet that leverages the browser’s runtime to perform tasks and stay active through background processes or ongoing connections to a remote controller. Cookies are just data stored by the browser, CAPTCHA is a human-verification test, and a Direct Timing Attack is a side-channel technique; none of those involve running malicious code in the browser that persists after leaving a page.

This question is about browser-based persistence where malicious code runs inside the browser and continues to operate even after you close the page or navigate away. That behavior is described by MarioNet, a term used for a browser-based botnet that leverages the browser’s runtime to perform tasks and stay active through background processes or ongoing connections to a remote controller. Cookies are just data stored by the browser, CAPTCHA is a human-verification test, and a Direct Timing Attack is a side-channel technique; none of those involve running malicious code in the browser that persists after leaving a page.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy