Learning  MALWARE !for fun and profit                SRINU              sr1nu@ymail.com
What is malware?   Types of malwares.    How to create your own malware (Educational purpose only)   Writing signatures to...
What is a malware ?              Malware short for malicious software .malware is a piece of software that is designed tod...
Types of malwareThere are many types of malwares are there.most common are :  Viruses  Worms  Rootkits  Trojans  Backdoors...
What is a Virus?A computer virus is a program that can replicateitself and spread from one computer to another.           ...
Indications of Virus attackHard drive is accessed even when not usingthe computer.Computer freezes frequently or encounter...
When computer get infected by Viruses Don’t having proper antivirus application. Not updating antivirus and operating syst...
How to create your own Virus (Educational purpose only)   DEMO
What is a WormA computer worm is a self-replicating malwarewhich uses a computer network to send copies ofitself to anothe...
Indications of worm attacks• Unusual network traffic in pc• Not able to visit websites due to bandwidth is  flooded by wor...
How Worm spreads Peer 2 peer    (p2p)       Infected USB   Network                                         Emailsnetworks ...
How to create your own Worm  (Educational purpose only)   DEMO
Rootkit               Rootkit is a stealthy type ofmalware designed to hide its existence fromprocesses viewer and other m...
Types of rootkits• There are two different types of rootkits. they  are :   – User Mode rootkit                       User...
Backdoors• A Backdoor is a way in to the system that  allows an attacker to access the victim  machine.• after penetrating...
Backdoor !!!!Hey got thebackdoor.       PWNED
Trojan• Trojan is a piece of software which contains  both legitimate code and malicious code.• performs covert and overt ...
Small story about Trojan
How to create your own Trojan  (Educational purpose only)   DEMO
Best Tips to Defend Against Malware                                Protect your                               computer wit...
Writing signatures to antiviruses     Mostly antivirus signature writers usethree methods to create signatures   They are:...
AgainDEMO
Evading Antiviruses  AgainAn AwesomeDEMO 
Any Queries
Special        Thanks          toImran             Raghu        chaitu
Learning  malware for fun and profit
Upcoming SlideShare
Loading in...5
×

Learning malware for fun and profit

9,110

Published on

Published in: Technology
3 Comments
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total Views
9,110
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
100
Comments
3
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Learning malware for fun and profit"

  1. 1. Learning MALWARE !for fun and profit SRINU sr1nu@ymail.com
  2. 2. What is malware? Types of malwares. How to create your own malware (Educational purpose only) Writing signatures to antiviruses.Evading antiviruses. (Educational purpose only)
  3. 3. What is a malware ? Malware short for malicious software .malware is a piece of software that is designed todisrupt operation , gather information , gainunauthorized access to system resources, and forexploitation purposes. The malware is a general term used by acomputer professionals to mean a variety of forms ofhostile , intrusive, or annoying software orprogramming code. In simply malware is a set of instructionsthat run on your computer and make your system dosomething that an attacker wants it to do.
  4. 4. Types of malwareThere are many types of malwares are there.most common are : Viruses Worms Rootkits Trojans Backdoors Spyware Keylogger Adware Crimeware ScarewareThis list goes on …………………
  5. 5. What is a Virus?A computer virus is a program that can replicateitself and spread from one computer to another. if a computer program is called asa virus it most have the capability to spread fromone file to another file and one computer toanother computer by means of Network or internetor carried it by a removable devices likeCD’s, DVD’s, Floppy disks and USB devices. in simply virus is a program thatcan infect other programs by modifying them toinclude a, possibly evolved, version of itself.
  6. 6. Indications of Virus attackHard drive is accessed even when not usingthe computer.Computer freezes frequently or encounterserrors.Computer slows down when programs starts.Files and Folders are missing (god has to knowwhat happened to files).Unable to load operating system files.Browser window freezes.
  7. 7. When computer get infected by Viruses Don’t having proper antivirus application. Not updating antivirus and operating system and applications. Installing pirated softwares and rouge applications. Opening an infected E-Mail attachments.
  8. 8. How to create your own Virus (Educational purpose only) DEMO
  9. 9. What is a WormA computer worm is a self-replicating malwarewhich uses a computer network to send copies ofitself to another computer. However, a computer worm does notneed to attach itself to a program in your systemlike a computer virus does in order to function. A computer worm generally localizes itsdamage to the computer network by causingincreased bandwidth(only applicable to old wormtypes )
  10. 10. Indications of worm attacks• Unusual network traffic in pc• Not able to visit websites due to bandwidth is flooded by worm.• Unusual files in network shares.• Unable to update antiviruses.
  11. 11. How Worm spreads Peer 2 peer (p2p) Infected USB Network Emailsnetworks like devices. shares. uTorrent.
  12. 12. How to create your own Worm (Educational purpose only) DEMO
  13. 13. Rootkit Rootkit is a stealthy type ofmalware designed to hide its existence fromprocesses viewer and other monitor softwares.
  14. 14. Types of rootkits• There are two different types of rootkits. they are : – User Mode rootkit User Mode – Kernel Mode rootkit Supervisor / Kernel Mode
  15. 15. Backdoors• A Backdoor is a way in to the system that allows an attacker to access the victim machine.• after penetrating the victim machine the attacker installs the backdoor in it.• it used to access the victim machine.• Example: NetCat
  16. 16. Backdoor !!!!Hey got thebackdoor. PWNED
  17. 17. Trojan• Trojan is a piece of software which contains both legitimate code and malicious code.• performs covert and overt actions.• Frequently embedded in applets, games and email attachments.• Examples – Beast – ProRat
  18. 18. Small story about Trojan
  19. 19. How to create your own Trojan (Educational purpose only) DEMO
  20. 20. Best Tips to Defend Against Malware Protect your computer with strong security software and keep updated. Enable Back up your automatic files regularly. Windows updates. Be careful Beware of when engaging spam-based in peer-to-peer phishing (P2P) file- schemes. sharing.
  21. 21. Writing signatures to antiviruses Mostly antivirus signature writers usethree methods to create signatures They are: MD5 hashes Byte code Heuristic
  22. 22. AgainDEMO
  23. 23. Evading Antiviruses AgainAn AwesomeDEMO 
  24. 24. Any Queries
  25. 25. Special Thanks toImran Raghu chaitu
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×