Lesson 04 - Malware Threats
4.01 Malware Analysis4.02 Trojan Concepts
4.03 Virus & Worm concepts
4.04 Counter measures
4.05 Anti-Malware software
Malware - causes damages to computer system & disable computer functionalities.
Trojan - packaged and deliveries inside legitimate software (hidden)
Virus - disracted the computer system & programs
Worms - automate replicated files
Botnet - inside networks ( take controls over the networks)
Backdoor - Bypass the security levels
spyware - without user knowledge
Ransomware - access denied
rootkit - administrator level increase
adware - Ads attacks
crypter - tools (save from the antivirus)
How it can get into system,
*Instant messanger application
*Removable Decvices
*Brower ( untrusted sites)
*Insecurce path managements
*Email attachments
*file sharing
*Wirless networks
*Installation by their malware
Techniques:
*Blackhat SEO
*Social engineering
*phishing sites
*Malvertising
*websites
*drive by download
*spam mails
why hackers do this,
*Money
*Steal sensitive informations
*proxy server
*video & recording images
Virus - distract the computer system & functionalities (with user interaction)
*File virus
*file extension virus
*add on virus
*email virus
*boot sector virus
*forklomb virus
*shutdown virus
*space consuming virus
JPS Virus Malware
worms - self replicate , worms( without interaction)
DOS attacks
Trojans:
harmful code which is under the non-harmful code
*Remote Access trojans
*Botnet
*Rootkit
*e-banking trojans
*proxy server
*mobile trojans
creation of trojans
888RAT
njRAT
ProRAT
Dark comet
Crypters -hide viruses to save from antivirus
swayzcryptor
Malware Analysis:
Reverse engineering piece of code malware ,origin,impact
*what happens
*Impact
*level
*remote vulnerability
*Damage
Static - without executing the malware perform
Dynamic - Behaviour Analysis
Code Analysis - Reverse Engineering
OS:cuckoo,flare VM
Requirement:
Sanbox environment
tools - cuckoo
pre installed tools
tools static analysis:Pestudio
4.05 Anti-Malware software
created to protect information system & computer
No comments:
Post a Comment