Virus Worm Trojans Spyware Malware Rootkit
Virus Worm Trojans Spyware Malware Rootkit : in this article you will learn about Virus Worm Trojans Spyware Malware Rootkit. and if this article helpful for you please like and share its to your friends and all your groups.
Virus Worm Trojans Spyware Malware Rootkit
Viruses use executable files to spread. Worms take use of system flaws to carry out their attacks. Trojan horse is a type of malware that runs through a program and is interpreted as utility software.
About this course: Ethical Hacking and Cyber Laws are two interconnected fields that play a crucial role in the modern digital landscape. Ethical hacking, also known as penetration testing or white-hat hacking, involves authorized and legal attempts to identify vulnerabilities and weaknesses in computer systems and networks. It aims to safeguard digital assets by employing the same techniques and tools used by malicious hackers, but with the consent and knowledge of the system owner. Virus Worm Trojans Spyware Malware Rootkit.
Malware Illustrations
Malware : Malware can be defined as a code mainly effects the traditional behaviour of the device or application.
Types of Malwares
Virus : Virus is a piece of code designed to effect the system in such a way that the hardwrae or software working capcbilities of the system will be damaged and user will not be able to work on the system anymore.
Note : A true virus cannnot spread from one computer to another computer without human assistance.
Free : USB Disk Security : Zbshare
Worm : Code which is designed to spread and run from one place to another. Mainly needs to be executed once and then automatically it will spread by iteself.
Example : Stuxnet Documentry: Zero Days
Trojans : These are RATs (Remote Accessing Tools), used to infect machines and then gain.
There are two types of troajns controller used by criminals globally.
- CyberGate
- DarkComet
- Zeus*
Working Types of Trojans
1. Direct Trojans : In this type of trojans we will create a .exe file and will send this to target with social eengineering as the victim will click on the file a certain back door port will be opened most 9999, 1337. Now to get remote access of the machine we want to get the IP address.
For Example: Beast V.20
2. Reverse Trojans : In this type of trojan the we will create a .exe file having our own IP address as well as a open port of our computer on which the vitcim’s machine will send a request to connect as the victim double clickon file.
Example: Sub7 , Cybergate, Darkcomet , Zeus (Web based).
Spywares : Keyloggers – Local Keylogger – Remote Keylogger
Local Keylogger : Family Keylogger fron Spyarsenal.com
Remote Keylogger: Ardamax Keylogger
Protection from Keyloggers: Keyscrambler
Download: https://www.qfxsoftware.com/
Adwares : These are the malwares which are designed to get unintentional clicks on ads by infecting code via plugins, havascript, crome extensions, Internet Explorer URL bAR and so on.
- Rootkits
- Botnets
- Ransomwares
System Protection from Malwares
1. Adwares: AdBlockers Extensions and Plugins (1)
2. Keyloggers: Keyscrambler (2)
3. Virus : USB Disk Security – FREE (3)
4. Trojans: You do not need AV. You need internet security suite.
- -> AVAST Security
- -> Vipre Internet Security
- -> Novirus Thanks EXE Radar Pro (4)
5. Sandbox(5)
- Secure System Configuration
- Firewalls
- Inbuilt Firewalls
MAC : Settings : Rule Set Block Incoming Settings
LINUX : CLI Based Rule Set
WINDOWS: Control Panel -> Firewall (6)
External Firewalls
-> Zone Alarm Firewall
Process Killing
-> process explorer
Download: https://learn.microsoft.com/en-us/sysinternals/downloads/process-explorer
Introduction of Ethical Hacking and cyber Laws
Network Technology in Ethical Hacking with Examples
Follow Us On Cyber Point Solution Youtube Channel : Click Here
Follow Us on Social Platforms to get Updated : twiter, facebook, Google Plus
Learn More Ethical Hacking and Cyber Security click on this link. cyber security