SlideShare a Scribd company logo
1 of 32
INTRODUCTION TO
TROJANS
VIRUS & WORMS
Virus is a piece of code which is meant for the malicious purpose. It can
replicate itself In the same system or also to the external hard drive. It may
harm your system by deleting vital information from your hard drive or by
corrupting the operating system files.
Worms are the malwares that replicates itself by resending itself as an e-mail
attachment or as part of a network message. Worms does not alter files but
resides in active memory and duplicates itself. Worm use parts of an
operating system that are automatic and usually invisible to the user
TROJANS
Trojans are piece of code which is meant for the remote
administration purpose. It may or may not harm your computer
but the hacker can administrate your computer remotely. A
hacker may see the webcam, can get the logs of all the key
strokes and can also delete any file & folders from your system.
Trojans are one of the most dangerous and widely used by
hackers to get into the systems
TYPES OF TROJANS
 Direct Connection Trojan
 Reverse Connection Trojan
DIRECT CONNECTION TROJAN
In the direct connection Trojan, Victim’s IP Address plays essential role. Hacker sends
Trojan to victim, victim unknowingly executes it. To get the remote connection of
victim’s computer, hacker needs to have IP Address of victim. Hacker uses different
methods to get the IP address of victims such as,
 Email Tracing
 IP Grabbing
 Social Engineering
REVERSE CONNECTION TROJAN
Hacker creates the Trojan with his own IP address. In this case, when a victim
executes the Trojan, hacker gets the connection. Hacker needs to open one
port to get the connection.
RAT (REMOTE ADMINISTRATION TOOL)
RAT IS, Remote Administration Tool used to create the Trojans. One can use
their own coding to create the Trojans also but RAT may help you to create it
easily.
 It is also used to control the victim’s computer. After creating and sending
the Trojan, hacker needs to open a port on his own system, for this a
hacker can use RAT.
 RAT is created by the hackers to help the hackers,
 Also after getting the connection hacker can perform various tasks such as
accessing the webcam, file & folder operations, edit the registry and even
can edit the command prompt of the victim using RAT.
RAT (REMOTE ADMINISTRATION TOOL)
RATs are available for both the types of Trojans. There are
numerous RATs available over the internet such as,
 Cyber Gate
 Dark Comet
 Pro Rat
 Poison Ivy
 Net Bus
Etc, etc, etc, …
RATs can perform:
 Keystroke Logging
 Packet Capture
 Screen Capture
 Camera Capture
 File Access
 Code Execution
 Registry Management
 Password Sniffing
PROBLEMS & SOLUTIONS
 An Antivirus may detect the Trojan
 And also what if hacker’s IP address is not static. After
restarting he will lose his IP address and also the connection
of the victim.
SOLUTION of STATIC IP
Website’s IP are static but our IP address may not be static. So, a hacker can
make the Trojan to connect to a particular host and then connect the system
to the host to get the reverse connection.
SOLUTION of ANTI-VIRUSES
All the anti-virus applications detects any trojan or any virus from it’s signature. If we
modify the signatures of the trojan or the viruses, we can prevent our trojan file from being
detected by the anti-viruses
 To change the signatures of the trojan a hacker can use applications called Crypters or
can also do it manually.
 There are lots of crypters available, and it’s very simple process to crypt file using
Crypters.
 To check how many anti-virus detects it as a trojan, scan it online at
http://www.virustotal.com
HOW TO SECURE YOURSELF??
 Check Opened ports
 Check the process of the system
 Run any unidentified file in Sandboxie
 Always install licensed anti-virus which updates it’s virus signatures
regularly
INTRODUCTION TO
SOCIAL ENGINEERING
“Cause there’s no PATCH for HUMAN STUPIDITY”
What is SOCIAL ENGINEERING??
In context of Information Security, it is the use of
deception to manipulate individuals into divulging
confidential or personal information that may be used
for fraudulent purposes.
TECHNIQUE
 Human Interaction
 Respectable & Known Person or Entity
 Assembling all gathered information together
TYPES OF SOCIAL ENGINEERING
 Quid Pro Quo – Something for something
 Phishing
 Baiting
 Pretexting
 Diversion Theft
Phishing Email
WEAKEST LINK??
No matter how strong your:
 Firewalls
 IDS & IPS
 Cryptography
 Anti-Virus Software
 You are the weakest link in computer security. People are more vulnerable
than computers.
 “The weakest link in the security chain is the human element: - Kevin
Mitnick
WAYS TO PREVENT SOCIAL ENGINEERING
 User Awareness
 Policies
 Third party Test
 Be Smart
Students prone to Cyber Crime
REASONS:
 Prank
 Jealousy
 Revenge
 Ignorance
 Ex-relationships
 Curiosity
 Blackmailing
 Pornography
RANSOMWARE
Mobile Security
Scarewares
Security Awareness – Social Media
 Social Media (FB, twitter, etc) is now an integral part of our daily life
 Be sensitive in what you upload on your social networking account (status, pics,
etc)
 Use security and privacy options provided by social media sites
 SMS based second factor authentication
 Access control (who can see what)
 Browser /machine mapping to your social media profile
 Block
 Keep your personal details, personal.
 Always use different passwords for different accounts
Security Awareness – Smart mobile devices
 DO NOT jail break or root your smart phones
 Connect to ONLY authorized wifi access
 Use auto lock features
 Download apps from authorized app stores ONLY
 Use Privacy options provided by various mobile Operating system
 Do NOT accept calls from weird numbers (VOIP)
 Don’t react to Scarewares

More Related Content

What's hot

Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Internet security issues
Internet security issuesInternet security issues
Internet security issuesirfan shaikh
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez JohnnAlvarez
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 

What's hot (20)

Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Internet security
Internet securityInternet security
Internet security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Presentation
PresentationPresentation
Presentation
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Malwares
MalwaresMalwares
Malwares
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Backdoor
BackdoorBackdoor
Backdoor
 

Similar to Cyber Security Seminar Day 2

trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dollsmastermind07
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 

Similar to Cyber Security Seminar Day 2 (20)

trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Information security
Information securityInformation security
Information security
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Trojan
TrojanTrojan
Trojan
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
Mitppt
MitpptMitppt
Mitppt
 

More from Apurv Singh Gautam

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsApurv Singh Gautam
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark WebApurv Singh Gautam
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentApurv Singh Gautam
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)Apurv Singh Gautam
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Apurv Singh Gautam
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management systemApurv Singh Gautam
 

More from Apurv Singh Gautam (15)

Automating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty thingsAutomating Threat Hunting on the Dark Web and other nitty-gritty things
Automating Threat Hunting on the Dark Web and other nitty-gritty things
 
Threat Hunting on the Dark Web
Threat Hunting on the Dark WebThreat Hunting on the Dark Web
Threat Hunting on the Dark Web
 
All about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS studentAll about Cyber Security - From the perspective of a MS student
All about Cyber Security - From the perspective of a MS student
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
Cyber Security Seminar Day 1
Cyber Security Seminar Day 1Cyber Security Seminar Day 1
Cyber Security Seminar Day 1
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Log Out Cyber Awareness
Log Out Cyber AwarenessLog Out Cyber Awareness
Log Out Cyber Awareness
 
OSINT
OSINTOSINT
OSINT
 
Intro to Network Vapt
Intro to Network VaptIntro to Network Vapt
Intro to Network Vapt
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Flexible Displays
Flexible DisplaysFlexible Displays
Flexible Displays
 
India against corruption
India against corruptionIndia against corruption
India against corruption
 
Encrypted database management system
Encrypted database management systemEncrypted database management system
Encrypted database management system
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Cyber Security Seminar Day 2

  • 2. VIRUS & WORMS Virus is a piece of code which is meant for the malicious purpose. It can replicate itself In the same system or also to the external hard drive. It may harm your system by deleting vital information from your hard drive or by corrupting the operating system files. Worms are the malwares that replicates itself by resending itself as an e-mail attachment or as part of a network message. Worms does not alter files but resides in active memory and duplicates itself. Worm use parts of an operating system that are automatic and usually invisible to the user
  • 3. TROJANS Trojans are piece of code which is meant for the remote administration purpose. It may or may not harm your computer but the hacker can administrate your computer remotely. A hacker may see the webcam, can get the logs of all the key strokes and can also delete any file & folders from your system. Trojans are one of the most dangerous and widely used by hackers to get into the systems
  • 4. TYPES OF TROJANS  Direct Connection Trojan  Reverse Connection Trojan
  • 5. DIRECT CONNECTION TROJAN In the direct connection Trojan, Victim’s IP Address plays essential role. Hacker sends Trojan to victim, victim unknowingly executes it. To get the remote connection of victim’s computer, hacker needs to have IP Address of victim. Hacker uses different methods to get the IP address of victims such as,  Email Tracing  IP Grabbing  Social Engineering
  • 6. REVERSE CONNECTION TROJAN Hacker creates the Trojan with his own IP address. In this case, when a victim executes the Trojan, hacker gets the connection. Hacker needs to open one port to get the connection.
  • 7. RAT (REMOTE ADMINISTRATION TOOL) RAT IS, Remote Administration Tool used to create the Trojans. One can use their own coding to create the Trojans also but RAT may help you to create it easily.  It is also used to control the victim’s computer. After creating and sending the Trojan, hacker needs to open a port on his own system, for this a hacker can use RAT.  RAT is created by the hackers to help the hackers,  Also after getting the connection hacker can perform various tasks such as accessing the webcam, file & folder operations, edit the registry and even can edit the command prompt of the victim using RAT.
  • 8. RAT (REMOTE ADMINISTRATION TOOL) RATs are available for both the types of Trojans. There are numerous RATs available over the internet such as,  Cyber Gate  Dark Comet  Pro Rat  Poison Ivy  Net Bus Etc, etc, etc, …
  • 9. RATs can perform:  Keystroke Logging  Packet Capture  Screen Capture  Camera Capture  File Access  Code Execution  Registry Management  Password Sniffing
  • 10. PROBLEMS & SOLUTIONS  An Antivirus may detect the Trojan  And also what if hacker’s IP address is not static. After restarting he will lose his IP address and also the connection of the victim.
  • 11. SOLUTION of STATIC IP Website’s IP are static but our IP address may not be static. So, a hacker can make the Trojan to connect to a particular host and then connect the system to the host to get the reverse connection.
  • 12. SOLUTION of ANTI-VIRUSES All the anti-virus applications detects any trojan or any virus from it’s signature. If we modify the signatures of the trojan or the viruses, we can prevent our trojan file from being detected by the anti-viruses  To change the signatures of the trojan a hacker can use applications called Crypters or can also do it manually.  There are lots of crypters available, and it’s very simple process to crypt file using Crypters.  To check how many anti-virus detects it as a trojan, scan it online at http://www.virustotal.com
  • 13. HOW TO SECURE YOURSELF??  Check Opened ports  Check the process of the system  Run any unidentified file in Sandboxie  Always install licensed anti-virus which updates it’s virus signatures regularly
  • 14. INTRODUCTION TO SOCIAL ENGINEERING “Cause there’s no PATCH for HUMAN STUPIDITY”
  • 15. What is SOCIAL ENGINEERING?? In context of Information Security, it is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
  • 16.
  • 17. TECHNIQUE  Human Interaction  Respectable & Known Person or Entity  Assembling all gathered information together
  • 18. TYPES OF SOCIAL ENGINEERING  Quid Pro Quo – Something for something  Phishing  Baiting  Pretexting  Diversion Theft
  • 20.
  • 21. WEAKEST LINK?? No matter how strong your:  Firewalls  IDS & IPS  Cryptography  Anti-Virus Software  You are the weakest link in computer security. People are more vulnerable than computers.  “The weakest link in the security chain is the human element: - Kevin Mitnick
  • 22. WAYS TO PREVENT SOCIAL ENGINEERING  User Awareness  Policies  Third party Test  Be Smart
  • 23.
  • 24. Students prone to Cyber Crime REASONS:  Prank  Jealousy  Revenge  Ignorance  Ex-relationships  Curiosity  Blackmailing  Pornography
  • 25.
  • 29.
  • 30.
  • 31. Security Awareness – Social Media  Social Media (FB, twitter, etc) is now an integral part of our daily life  Be sensitive in what you upload on your social networking account (status, pics, etc)  Use security and privacy options provided by social media sites  SMS based second factor authentication  Access control (who can see what)  Browser /machine mapping to your social media profile  Block  Keep your personal details, personal.  Always use different passwords for different accounts
  • 32. Security Awareness – Smart mobile devices  DO NOT jail break or root your smart phones  Connect to ONLY authorized wifi access  Use auto lock features  Download apps from authorized app stores ONLY  Use Privacy options provided by various mobile Operating system  Do NOT accept calls from weird numbers (VOIP)  Don’t react to Scarewares