Sie sind auf Seite 1von 19

Understanding Viruses

Computer Viruses

A true virus can only spread from one computer to another in some form of executable code when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

How Computer Viruses Work


i.

Infection Phase:

ii.

Attack Phase:

Different Types of Computer Viruses

1)
2) 3) 4) 5) 6) 7) 8) 9)

10)

Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus

Popular Viruses
1)

Anna Kournikova

2)

Autorun

3)

Michelangelo

WORMS

In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.

Types of Worms

a) Email Worms b) Instant Messaging Worms

c) Internet Worms
d) IRC Worms e) File-sharing Networks Worms

Some Popular Worms


1)

ILOVEYOU

2)

Melissa

3)

My Doom

4)

Conficker

Trojans

A Trojan infection can allow total remote access to your computer by a third party.

Objectives of Trojans

Using the Trojaned machine as part of a Botnet to stage another attack like DDOS etc. Trojans can install Softwares so that they can upload or download files and data directly from your computer. Trojans can modify or delete your files. Trojans also supports Keystroke logging and they can monitor people without their knowledge. Wasting computer storage space. Crashing the computer.

Types of Trojan
i. ii. iii. iv.

Remote Access Trojans Password Sending Trojans Key loggers Trojans Proxy/Wingate Trojans

Name of The Trojan Software


i. ii. iii. iv. v. vi.

Net Bus Subseveen Beast Prorat Poison Ivy Turkojan

Malwares
Malware is a category of malicious code that includes viruses, worms, and Trojan horses. Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy.

Some Famous Malware


i.

Stuxnet

ii.

ZeuS 2.0

Spyware
Spyware is software that sends your personal information to a third party without your permission or knowledge. This can include information about Web sites you visit or something more sensitive like your user name and password.

Name of Spywares
1) 2) 3)

CoolWebSearch Internet Optimizer Key Logger


i. Hardware Key-Logger

ii.

Software Key-Logger

Some Famous Software Key-Logger


i. ii. iii. iv.

Ardamax Keylogger Actual Spy Keylogger Spytector Keylogger Ultimate Keylogger

THE END

Das könnte Ihnen auch gefallen