Professional Documents
Culture Documents
Malware Chp 8
(Report)
There are many tools for virus maker such as terabit virus maker, poison virus
maker, gps virus maker, but the tool which we use to implement is Terabit virus
maker. This is used to create virus actually Terabit Virus Maker is a prank
application that allows you to control various Windows functions in a fun way. It's
might appear to be a virus, but it's just a fun tool that can be installed and removed
easily. It doesn't delete data or provide personal data.
Malware Types
File less malware
Ransomware
Virus
Trojan
Logic Bomb
Rootkit and types
Trapdoor
Worm
Spyware
Malvertising
Malicious Fonts/code
Spyware
Technology that aids in gathering information about a person or organization
without their knowledge.
On the Internet Spyware is programming that is put in someone’s computer
to secretly gather information about the user and relay it to advertisers or
other interested parties?
Spyware can get in a computer as a software virus or as the result of
installing a new program.
Virus
A program or programming code that replicates by being copied or initiating
its copying to another program, computer boot sector or document.
Viruses can be transmitted as attachments to an e-mail note or in a
downloaded file, or be present on a diskette or CD. And is designed to
spread from one computer to another.
Worm
A computer worm is a standalone malware computer program that replicates
itself in order to spread to other computers.
It often uses a computer network to spread itself, relying on security failures
on the target computer to access it.
It will use this machine as a host to scan and infect other computers.
Logic Bomb
Fileless malware
Randsomware
Malicious Fonts
Webpage text that exploits the default method used to de-compress
Embedded Open Type Fonts in Windows based programs including Internet
Explorer and Outlook.
These malicious fonts are designed to trigger a buffer overflow which will
disable the security on Windows-based PCs.
This allows an intruder to take complete control of the affected computer
and remotely execute destructive activities including installing unauthorized
programs and manipulating data.
Rootkit
Rootkits are a set of software tools used by an intruder to gain and maintain
access to a computer system without the user's knowledge.
These tools conceal covert running processes, files and system data making
them difficult to detect.
There are rootkits to penetrate a wide variety of operating systems including
Linux, Solaris and versions of Microsoft Windows. A computer with rootkits on it
is called a rooted computer.
Summary
In this chapter, we covered one of the largest and most dangerous threats that has
emerged and evolved over the last 30 years: malware. You learned that malware is
a blanket term used to describe the family of software that includes viruses, worms,
Trojans, and logic bombs, as well as adware and spyware. Each of these types of
malware has been responsible for problems over the years and has done everything
from being an annoyance to causing outright harm.