virus technology

Upload: chintan-frogy-gurjar

Post on 14-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Virus Technology

    1/22

    SUBMITTED BYZamirahmed (08CE216)

    GANDHINAGAR INSTITUTE OF

    TECNOLOGY

  • 7/30/2019 Virus Technology

    2/22

    INDEX

    1. Introduction of Malicious Programs.2. Introduction of Virus

    3. Types of Viruses.

    4. Structure Of Virus5. Working style of Virus.

    6. Symptoms Of virus infecting.

    7. How it spreads so quickly.

    8. Example-Bugfee,Cascade(Virus)9. Limitations of Anti-Viruses.

    10. Conclusion.

    11. Bibliography

  • 7/30/2019 Virus Technology

    3/22

  • 7/30/2019 Virus Technology

    4/22

    What is Computer Virus ?

    File :- (1)Courrpt installed Softwares

    (2)Avoid Detection

    (3)Infect Files

  • 7/30/2019 Virus Technology

    5/22

    Classification Of Virus

    Viruses

    BootSector

    Viruses

    MultipartieViruses

    Floppy

    Disk Boot

    Sector

    Viruses

    Hard Disk

    Master

    Boot

    Record

    (MBR)/

    Partition

    TableViruses

    Polymorphic

    Viruses

    StealthViruses

    File/ProgramViruses

    MacroViruses

  • 7/30/2019 Virus Technology

    6/22

    File/Program Viruses

    Purpose:- To infect installed Program

    and system files.Speciality:-They load viruses into memory.

    Examples:-Sunday,Cascade

  • 7/30/2019 Virus Technology

    7/22

    Boot Sector Viruses

    Types :- (1)Floppy Disk Boot Sector Viruses

    (2) Hard Disk Master Boot Record(MBR)/ Partition Table Viruses

    Speciality:-It copies the master boot record to

    another place or overwrites on it.

  • 7/30/2019 Virus Technology

    8/22

    Multipartite Viruses

    Hybrid Varity-combination of boot virus

    and file Program, virus.

    First it goes to master boot program .then it

    replaces or overwrites it and then start infecting

    files.

  • 7/30/2019 Virus Technology

    9/22

    Stealth Viruses

    Very latest viruses. they HIDE itself. They

    sometimes REMOVES temporarythemselves to

    avoid to be detected.(Compression)

  • 7/30/2019 Virus Technology

    10/22

    Macro Viruses

    A set of many destructive instructions made in VB.

    (Visual Basic).They are email fileattachments.

    For a macro viruses to infect a system, the

    document with the embedded VB code, must be

    opened.

  • 7/30/2019 Virus Technology

    11/22

    Polymorphic Viruses

    Most Difficult to detect. it makes copies

    of it in registry. so the whole system is being

    infected by this virus.

  • 7/30/2019 Virus Technology

    12/22

    Structure of VirusProgram V:=

    {goto main;

    123456;

    subroutine infect-executable:=

    {loop:

    file:=get-random-executable-file;

    if(first-line-of-file=123456)

    then goto loop

    else pretend V to file:}subroutine do-damage:=

    {whatever damage is to be done}

    subroutine trigger-pulled:=

    {stop infecting}

    Main: main program:={infect-executable;

    if trigger-pulled then do damage;

    goto next;}

    Next:

    }

  • 7/30/2019 Virus Technology

    13/22

    HOW DOES VIRUS WORKS

    Enter by email,downloads,floppy disk or hacking

    Then make copies of itself to spread.

    They will wait for the signal for being activated.

  • 7/30/2019 Virus Technology

    14/22

  • 7/30/2019 Virus Technology

    15/22

    HOW VIRUSES SPREAD SO

    QUICKLY ?

    The code written to create a virus is responsible to sprea

    the virus in a particular system.

    Portable Storage devices

    Internet

  • 7/30/2019 Virus Technology

    16/22

    BUGFEEVIRUS

    A love letter which is e-mail attachments.

    Infection :-

    Difficult to open Media files

    Difficult to open .jpg , .bmp , .gif etc

  • 7/30/2019 Virus Technology

    17/22

    CASCADE Virus

  • 7/30/2019 Virus Technology

    18/22

    Working Of Cascade Virus

    (1)It hides our drives.

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\

    Dword-NoDrives:=1(2)It locks our window registry.

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System

    DisableRegistrytools:=1(3)Its two attachments deletes *.dll and *.sys

    files.

  • 7/30/2019 Virus Technology

    19/22

    LIMITATIONS OF ANTI-VIRUS

    PROGRAMS

    Trial Versions.

    old version cant detect.

    License version are so costly.

    Regular you have to take virus definitions.

  • 7/30/2019 Virus Technology

    20/22

    CONCLUSION

    While using diff. External Data storage devices like cds,

    floppy disk scan all the devices using latest updated

    anti-virus.

    PREVENTION IS ALLWAYES BETTER THAN CURE.

  • 7/30/2019 Virus Technology

    21/22

    BIBLIOGRAPHY

    Book :- An Unofficial Guide of Ethical Hacking

    Author :- Ankit Fadia

    Url:- www.fadia.com

    www.hackingmobilephones.com

    http://localhost/var/www/apps/conversion/tmp/scratch_2/-http://localhost/var/www/apps/conversion/tmp/scratch_2/-http://localhost/var/www/apps/conversion/tmp/scratch_2/-
  • 7/30/2019 Virus Technology

    22/22