Thursday 14 September 2023

Lesson 04 - Malware Threats

Lesson 04 - Malware Threats

4.01 Malware Analysis

4.02 Trojan Concepts

4.03 Virus & Worm concepts

4.04 Counter measures

4.05 Anti-Malware software

Malware - causes damages to computer system & disable computer functionalities.

Trojan - packaged and deliveries inside legitimate software (hidden)

Virus - disracted the computer system & programs

Worms - automate replicated files

Botnet - inside networks ( take controls over the networks)

Backdoor - Bypass the security levels

spyware -  without user knowledge

Ransomware - access denied

rootkit - administrator level increase

adware - Ads attacks

crypter - tools (save from the antivirus)

How it can get into system,

*Instant messanger application

*Removable Decvices

*Brower ( untrusted sites)

*Insecurce path managements

*Email attachments

*file sharing

*Wirless networks

*Installation by their malware



Techniques:

*Blackhat SEO

*Social engineering 

*phishing sites

*Malvertising

*websites

*drive by download

*spam mails

why hackers do this,

*Money

*Steal sensitive informations

*proxy server

*video & recording  images

Virus - distract the computer system & functionalities (with user interaction)

*File virus

*file extension virus 

*add on virus

*email virus

*boot sector virus

*forklomb virus

*shutdown virus

*space consuming virus

JPS Virus Malware

worms - self replicate , worms( without interaction)

DOS attacks

Trojans:

harmful code which is under the non-harmful code

*Remote Access trojans

*Botnet

*Rootkit

*e-banking trojans

*proxy server

*mobile trojans

creation of trojans

888RAT

njRAT

ProRAT

Dark comet

Crypters -hide viruses to save from antivirus 

swayzcryptor

Malware Analysis:

 Reverse engineering piece of code malware ,origin,impact

*what happens

*Impact

*level 

*remote vulnerability

*Damage

Static - without executing the malware perform 

Dynamic  - Behaviour Analysis

Code Analysis - Reverse Engineering


OS:cuckoo,flare VM

Requirement:

Sanbox environment

tools - cuckoo

pre installed tools


tools static analysis:Pestudio


4.05 Anti-Malware software


created to protect information system & computer





























No comments:

Post a Comment