Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

15
Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December

Transcript of Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Page 1: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Topic : Malicious SoftwareWritten By :Kaveh Maroufi2013 16 December

Page 2: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Malicious Software

- A general term used to describe viruses, worms, spyware and all the things that can cause damage to the computer and steal information.

Page 3: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Virus Spyware

Trojan

Malicious Software

Page 4: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Virus

Duplicate Subscription

Script Of Autorun Files

Windows Files

Connecting to executable files

Objective: Destroy , fun .....

Bat - Terabit

Page 5: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Spyware

Software installed on your computer, collect data without your knowledge, and Send To Hacker

Keylogger Rat

Page 6: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Keylogger

1- Keylog Every Thing Typed2 -Sending Screen Shot Of every X second3- Sending Yahoo Messenger Pw Every Version4- Sending Gmail/Hotmail/Aol/Yahoo Mail… Password5- Sending Blogfa/Mihanblog/Blogspot…… Password6- Sending Persiangig/Parsa Space………… Password7- Sending Ftp/Cpanel………… Password8-Sending Cloob/Facebook……Password9-Sending All communication Programs : Skype/oovoo…10- Sending Ip Address11 -Run in All Coffenets & Operating Systems (Xp-7-8)12-All Visitied Websites Link13- Sending Clipboard !14- Bypass DeepFreeze

Page 7: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.
Page 8: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Rat

1-View Webcam2-Remote Desktop 3-Record Screen Shot 4-Transfer File 5-Uplod & Download File 6-DDose Client 7-Run Program 8-Remove & Rename File9-Stealer Password 10-Registery Editing

Professional Keylogger

Page 9: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

• Trojan horses are programs that apparently seem harmless. But secretly have malicious code that will do something else.

Trojan

The Difference with virus:

1 – Duplicate2-Installed By the user.

Page 10: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Few terms in the virus writing:

Melt

Bind

Crypt

Resize

Page 11: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Examples of viruses :

SasserTixcet.AI Love YouPGPCoder.E

Hybrid virus:

Recovery Grab IMporT Hidden

Page 12: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Social

Engineering

Page 13: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Cracker

Keylogger

Spy

14 character,Symbol,Number

Space First & End

Osk,Virtual Keyboards,Clipboard

Data protection

Page 14: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Kaveh Maroufi

www.KavehMaroufi.com

[email protected]

Page 15: Topic : Malicious Software Written By :Kaveh Maroufi 2013 16 December.

Source