Virus Worm Trojans Spyware Malware Rootkit

Virus Worm Trojans Spyware Malware Rootkit

Virus Worm Trojans Spyware Malware Rootkit : in this article you will learn about Virus Worm Trojans Spyware Malware Rootkit. and if this article helpful for you please like and share its to your friends and all your groups.

Virus Worm Trojans Spyware Malware Rootkit

Viruses use executable files to spread. Worms take use of system flaws to carry out their attacks. Trojan horse is a type of malware that runs through a program and is interpreted as utility software.

About this course: Ethical Hacking and Cyber Laws are two interconnected fields that play a crucial role in the modern digital landscape. Ethical hacking, also known as penetration testing or white-hat hacking, involves authorized and legal attempts to identify vulnerabilities and weaknesses in computer systems and networks. It aims to safeguard digital assets by employing the same techniques and tools used by malicious hackers, but with the consent and knowledge of the system owner. Virus Worm Trojans Spyware Malware Rootkit.

Malware Illustrations

Malware : Malware can be defined as a code mainly effects the traditional behaviour of the device or application.

Types of Malwares

Virus : Virus is a piece of code designed to effect the system in such a way that the hardwrae or software working capcbilities of the system will be damaged and user will not be able to work on the system anymore.

Note : A true virus cannnot spread from one computer to another computer without human assistance.

Free : USB Disk Security : Zbshare

Worm : Code which is designed to spread and run from one place to another. Mainly needs to be executed once and then automatically it will spread by iteself.

Example : Stuxnet Documentry: Zero Days

Trojans : These are RATs (Remote Accessing Tools), used to infect machines and then gain.

There are two types of troajns controller used by criminals globally.

  1. CyberGate
  2. DarkComet
  3. Zeus*

Working Types of Trojans

1. Direct Trojans : In this type of trojans we will create a .exe file and will send this to target with social eengineering as the victim will click on the file a certain back door port will be opened most 9999, 1337. Now to get remote access of the machine we want to get the IP address.

For Example: Beast V.20

2. Reverse Trojans : In this type of trojan the we will create a .exe file having our own IP address as well as a open port of our computer on which the vitcim’s machine will send a request to connect as the victim double clickon file.

Example: Sub7 , Cybergate, Darkcomet , Zeus (Web based).

Spywares : Keyloggers – Local Keylogger – Remote Keylogger

Local Keylogger : Family Keylogger fron

Remote Keylogger: Ardamax Keylogger

Protection from Keyloggers: Keyscrambler


Adwares : These are the malwares which are designed to get unintentional clicks on ads by infecting code via plugins, havascript, crome extensions, Internet Explorer URL bAR and so on.

  • Rootkits
  • Botnets
  • Ransomwares

System Protection from Malwares

1. Adwares: AdBlockers Extensions and Plugins (1)

2. Keyloggers: Keyscrambler (2)

3. Virus : USB Disk Security – FREE (3)

4. Trojans: You do not need AV. You need internet security suite.

  • -> AVAST Security
  • -> Vipre Internet Security
  • -> Novirus Thanks EXE Radar Pro (4)

5. Sandbox(5)

  • Secure System Configuration
  • Firewalls
  • Inbuilt Firewalls

MAC : Settings : Rule Set Block Incoming Settings

LINUX : CLI Based Rule Set

WINDOWS: Control Panel -> Firewall (6)

External Firewalls

-> Zone Alarm Firewall

Process Killing

-> process explorer


Virus Worm Trojans Spyware Malware Rootkit
Related Links:


Follow Us On Cyber Point Solution Youtube Channel : Click Here

Follow Us on Social Platforms to get Updated : twiter,  facebookGoogle Plus

Learn More Ethical Hacking and Cyber Security click on this link. cyber security

Leave a Reply

Your email address will not be published. Required fields are marked *