-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmalware
234 lines (192 loc) · 3.89 KB
/
malware
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
malware threats::
malware::
s/w perform malicious action
botnets(remotely control)
how does malware get in:::
virus:human assistants
worms:automatically
concelment::
rootkit::modify the os to hide
trojen::code hidden inside the desired files
inside attacks::
backdoor::
hidden features
easter egg
logic bomb::
based on logical condition
omega bomb::
trojen::
harmfull code (payload)
it contains:
keylogger,rootkit,spyware or other executable code
trojen lifecycle:::
payload(find info)
legitimate program(inject payload to lagimate prog)
spread(like in torrent,website etc)
infect(install,permission in same level)
goals::
disable firewall
replace or delete os files:
open a backdoor
disable anti virus
turn target into proxy
add to a botnet
generate bogus traffic for dos
download and install spyware,adware etc
grab screen shots
record video from camera
use target for spamming
clue for trojen::
antivirus disabled
ctrl+alt+del stops working
random restart
screen saver
task bars disabled
start disapperar
dvd drive eject randomly
hard drive activiy
heavy network traffic
isp complaints
trojen infecton:::
infect the target::
combine multiple files
click on file
email attachement
social engineering
setookit(tools)
different ways to enter::
evading antivirus::
changing checksum
write your trojen
google project:::
prescramber
use hex editor
break the trojan into multiple files
modify the syntex
avoid id's trojen
types of trojens::
top 10::
notfication trojen
IRC
PHP
net send
ICQ
Botnet trojen
proxy server trojen
FTP server
VNC trojen
HTTP/HTTPS trojen
create a tunnel
port 80//443
traffic convert into base 64
comman shell trojen
netcat
tellnet into shell
full dns checking
use any local port and slowmo
Document trojen
Email based trojen
RAT trojen(remote access trojen)
back orifice /net bus
Beast(tools) not run into origin machine
virus and worms::
difference::
virus::
attache iteself into file/program
replace system files
cannt be spread withoud human interacton
worms::
attached
copy iteself and replicate itself
does't require human interacton
enter via vulnarablity
usess standard file trasport feature
SQL slammer 2003(worm sexample):::
based on proof of conecept
create denial of service in network
routers are failed
types of viruses and worms:::
file virus
cluster virus
boot sector virus
macro virus
polymorphic virus
meta morphic ::modify iteself in alll devices(skynet)
cavity virus::file overrride (space filler) modify host files
encryption virus
camoflage virus
.com,.exe,.batch name.extinsion run .com first thien .exe and .batch
shell virus
file extension
tunnel virus(hide themself into system sector)
itrusive virus
life cycle:::
creation-->replicate-->discovery-->resolution-->purging--
^-------------------------------------------------------!
phase ::
infection phase::
replicate and attached
needs an events
setup files
start up
TSR
Attack phase::
corruption begin
delete
alter files
execute tasks
camoflauge
sign and why:::
deployments virus and worms::
downld files
pirate s/w
real fake does it matter::
email headers
delete legitmate files
detecting malwares::
create a virus
terabit virus maker(tools)
IWMT(internet worm maker theme)(tools)
ivestigations::
where to start
sheep dip
clean system
super dale virutalizatoin
monitor every things
setup:
install virtualization
Quarantine the n/w
disabled shared folder
copy malware
collect string values inside binerie
bintxt(tools)
UPX(tools)
port monitoring s/w
online malware testing
virus total(website)
malware protection center(website)
tools and utility belt::
tcpview(tools)
autoruns(tools)
driver view(tools)
SFC (system file checker)(tools)
counter measuers::
virus discovery methods::
scanning:
integrity checking
interception
masterlist::
3 level
server
antivirus
create a policyies
watch downloading
update s/w
attachement issues
what's source
keep informed
scan system daily
check media
popups
chat files
firwall and UAC