SlideShare a Scribd company logo
1 of 26
Learning
  MALWARE !
for fun and profit
                SRINU
              sr1nu@ymail.com
What is malware?


   Types of malwares.


    How to create your own malware (Educational purpose only)


   Writing signatures to antiviruses.


Evading antiviruses. (Educational purpose only)
What is a malware ?
              Malware short for malicious software .
malware is a piece of software that is designed to
disrupt operation , gather information , gain
unauthorized access to system resources, and for
exploitation purposes.
               The malware is a general term used by a
computer professionals to mean a variety of forms of
hostile , intrusive, or annoying software or
programming code.
               In simply malware is a set of instructions
that run on your computer and make your system do
something that an attacker wants it to do.
Types of malware
There are many types of malwares are there.
most common are :
  Viruses
  Worms
  Rootkits
  Trojans
  Backdoors
  Spyware
  Keylogger
  Adware
  Crimeware
  Scareware
This list goes on …………………
What is a Virus?
A computer virus is a program that can replicate
itself and spread from one computer to another.
                    if a computer program is called as
a virus it most have the capability to spread from
one file to another file and one computer to
another computer by means of Network or internet
or carried it by a removable devices like
CD’s, DVD’s, Floppy disks and USB devices.
                   in simply virus is a program that
can infect other programs by modifying them to
include a, possibly evolved, version of itself.
Indications of Virus attack
Hard drive is accessed even when not using
the computer.
Computer freezes frequently or encounters
errors.
Computer slows down when programs starts.
Files and Folders are missing (god has to know
what happened to files).
Unable to load operating system files.
Browser window freezes.
When computer get infected by Viruses

 Don’t having proper antivirus application.
 Not updating antivirus and operating system
 and applications.
 Installing pirated software's and rouge
 applications.
 Opening an infected E-Mail attachments.
How to create your own Virus
 (Educational purpose only)




   DEMO
What is a Worm
A computer worm is a self-replicating malware
which uses a computer network to send copies of
itself to another computer.
             However, a computer worm does not
need to attach itself to a program in your system
like a computer virus does in order to function.
             A computer worm generally localizes its
damage to the computer network by causing
increased bandwidth(only applicable to old worm
types )
Indications of worm attacks
• Unusual network traffic in pc
• Not able to visit websites due to bandwidth is
  flooded by worm.
• Unusual files in network shares.
• Unable to update antiviruses.
How Worm spreads



 Peer 2 peer
    (p2p)       Infected USB   Network
                                         Emails
networks like      devices.    shares.
  uTorrent.
How to create your own Worm
  (Educational purpose only)




   DEMO
Rootkit

               Rootkit is a stealthy type of
malware designed to hide its existence from
processes viewer and other monitor software's.
Types of rootkits
• There are two different types of rootkits. they
  are :
   – User Mode rootkit                       User Mode

   – Kernel Mode rootkit



                   Supervisor /
                   Kernel Mode
Backdoors
• A Backdoor is a way in to the system that
  allows an attacker to access the victim
  machine.
• after penetrating the victim machine the
  attacker installs the backdoor in it.
• it used to access the victim machine.

• Example: NetCat
Backdoor !!!!




Hey got the
backdoor.
       PWNED
Trojan
• Trojan is a piece of software which contains
  both legitimate code and malicious code.
• performs covert and overt actions.
• Frequently embedded in applets, games and
  email attachments.
• Examples
        – Beast
        – ProRat
Small story about Trojan
How to create your own Trojan
  (Educational purpose only)




   DEMO
Best Tips to Defend Against Malware
                                Protect your
                               computer with
                               strong security
                                software and
                               keep updated.



                                                               Enable
       Back up your                                          automatic
      files regularly.                                       Windows
                                                              updates.




                                                    Be careful
                   Beware of
                                                 when engaging
                  spam-based
                                                 in peer-to-peer
                    phishing
                                                    (P2P) file-
                   schemes.
                                                     sharing.
Writing signatures to antiviruses
     Mostly antivirus signature writers use
three methods to create signatures
   They are:
             MD5 hashes
             Byte code
             Heuristic
Again
DEMO
Evading Antiviruses


  Again
An Awesome
DEMO 
Any Queries
Special
        Thanks
          to




Imran             Raghu




        chaitu

More Related Content

What's hot

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
wenxin
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
cheauyih
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 

What's hot (20)

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 

Similar to Learning malware for fun and profit

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 

Similar to Learning malware for fun and profit (20)

Malware
MalwareMalware
Malware
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malicious
MaliciousMalicious
Malicious
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus project
Virus projectVirus project
Virus project
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Learning malware for fun and profit

  • 1. Learning MALWARE ! for fun and profit SRINU sr1nu@ymail.com
  • 2. What is malware? Types of malwares. How to create your own malware (Educational purpose only) Writing signatures to antiviruses. Evading antiviruses. (Educational purpose only)
  • 3. What is a malware ? Malware short for malicious software . malware is a piece of software that is designed to disrupt operation , gather information , gain unauthorized access to system resources, and for exploitation purposes. The malware is a general term used by a computer professionals to mean a variety of forms of hostile , intrusive, or annoying software or programming code. In simply malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
  • 4. Types of malware There are many types of malwares are there. most common are : Viruses Worms Rootkits Trojans Backdoors Spyware Keylogger Adware Crimeware Scareware This list goes on …………………
  • 5. What is a Virus? A computer virus is a program that can replicate itself and spread from one computer to another. if a computer program is called as a virus it most have the capability to spread from one file to another file and one computer to another computer by means of Network or internet or carried it by a removable devices like CD’s, DVD’s, Floppy disks and USB devices. in simply virus is a program that can infect other programs by modifying them to include a, possibly evolved, version of itself.
  • 6. Indications of Virus attack Hard drive is accessed even when not using the computer. Computer freezes frequently or encounters errors. Computer slows down when programs starts. Files and Folders are missing (god has to know what happened to files). Unable to load operating system files. Browser window freezes.
  • 7. When computer get infected by Viruses Don’t having proper antivirus application. Not updating antivirus and operating system and applications. Installing pirated software's and rouge applications. Opening an infected E-Mail attachments.
  • 8. How to create your own Virus (Educational purpose only) DEMO
  • 9. What is a Worm A computer worm is a self-replicating malware which uses a computer network to send copies of itself to another computer. However, a computer worm does not need to attach itself to a program in your system like a computer virus does in order to function. A computer worm generally localizes its damage to the computer network by causing increased bandwidth(only applicable to old worm types )
  • 10. Indications of worm attacks • Unusual network traffic in pc • Not able to visit websites due to bandwidth is flooded by worm. • Unusual files in network shares. • Unable to update antiviruses.
  • 11. How Worm spreads Peer 2 peer (p2p) Infected USB Network Emails networks like devices. shares. uTorrent.
  • 12.
  • 13. How to create your own Worm (Educational purpose only) DEMO
  • 14. Rootkit Rootkit is a stealthy type of malware designed to hide its existence from processes viewer and other monitor software's.
  • 15. Types of rootkits • There are two different types of rootkits. they are : – User Mode rootkit User Mode – Kernel Mode rootkit Supervisor / Kernel Mode
  • 16. Backdoors • A Backdoor is a way in to the system that allows an attacker to access the victim machine. • after penetrating the victim machine the attacker installs the backdoor in it. • it used to access the victim machine. • Example: NetCat
  • 17. Backdoor !!!! Hey got the backdoor. PWNED
  • 18. Trojan • Trojan is a piece of software which contains both legitimate code and malicious code. • performs covert and overt actions. • Frequently embedded in applets, games and email attachments. • Examples – Beast – ProRat
  • 20. How to create your own Trojan (Educational purpose only) DEMO
  • 21. Best Tips to Defend Against Malware Protect your computer with strong security software and keep updated. Enable Back up your automatic files regularly. Windows updates. Be careful Beware of when engaging spam-based in peer-to-peer phishing (P2P) file- schemes. sharing.
  • 22. Writing signatures to antiviruses Mostly antivirus signature writers use three methods to create signatures They are: MD5 hashes Byte code Heuristic
  • 24. Evading Antiviruses Again An Awesome DEMO 
  • 26. Special Thanks to Imran Raghu chaitu