Adware the series, part 2


Userlevel 7
Badge +54
See Also - Adware the series, part 1
 
May 3, 2017 by Pieter Arntz
 
In this post, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Though most are classified as PUPs, you will also see the occasional Trojan or rootkit, especially for the types that are more difficult to detect and remove.
 
Reroute and intercept
 
  • We will discuss a few methods to reroute, intercept, and change your internet traffic. They are:
  • Proxies, using a third party server between the machine and the internet.
  • LSP hijacks, inserting a third party file into the winsock.
  • DNS hijacks, connecting to another site by altering the Domain Name System results.
                                      


 
Full Article

3 replies

Userlevel 7
Badge +56
Thanks Jeff!
 
Daniel
Userlevel 7
Good follow up to Part 1...thanks for remembering to find this and post it, Jasper. :D
Userlevel 7
Badge +54
@ wrote:
Good follow up to Part 1...thanks for remembering to find this and post it, Jasper. :D
We aim to please 😉

Reply