virus technology
TRANSCRIPT
-
7/30/2019 Virus Technology
1/22
SUBMITTED BYZamirahmed (08CE216)
GANDHINAGAR INSTITUTE OF
TECNOLOGY
-
7/30/2019 Virus Technology
2/22
INDEX
1. Introduction of Malicious Programs.2. Introduction of Virus
3. Types of Viruses.
4. Structure Of Virus5. Working style of Virus.
6. Symptoms Of virus infecting.
7. How it spreads so quickly.
8. Example-Bugfee,Cascade(Virus)9. Limitations of Anti-Viruses.
10. Conclusion.
11. Bibliography
-
7/30/2019 Virus Technology
3/22
-
7/30/2019 Virus Technology
4/22
What is Computer Virus ?
File :- (1)Courrpt installed Softwares
(2)Avoid Detection
(3)Infect Files
-
7/30/2019 Virus Technology
5/22
Classification Of Virus
Viruses
BootSector
Viruses
MultipartieViruses
Floppy
Disk Boot
Sector
Viruses
Hard Disk
Master
Boot
Record
(MBR)/
Partition
TableViruses
Polymorphic
Viruses
StealthViruses
File/ProgramViruses
MacroViruses
-
7/30/2019 Virus Technology
6/22
File/Program Viruses
Purpose:- To infect installed Program
and system files.Speciality:-They load viruses into memory.
Examples:-Sunday,Cascade
-
7/30/2019 Virus Technology
7/22
Boot Sector Viruses
Types :- (1)Floppy Disk Boot Sector Viruses
(2) Hard Disk Master Boot Record(MBR)/ Partition Table Viruses
Speciality:-It copies the master boot record to
another place or overwrites on it.
-
7/30/2019 Virus Technology
8/22
Multipartite Viruses
Hybrid Varity-combination of boot virus
and file Program, virus.
First it goes to master boot program .then it
replaces or overwrites it and then start infecting
files.
-
7/30/2019 Virus Technology
9/22
Stealth Viruses
Very latest viruses. they HIDE itself. They
sometimes REMOVES temporarythemselves to
avoid to be detected.(Compression)
-
7/30/2019 Virus Technology
10/22
Macro Viruses
A set of many destructive instructions made in VB.
(Visual Basic).They are email fileattachments.
For a macro viruses to infect a system, the
document with the embedded VB code, must be
opened.
-
7/30/2019 Virus Technology
11/22
Polymorphic Viruses
Most Difficult to detect. it makes copies
of it in registry. so the whole system is being
infected by this virus.
-
7/30/2019 Virus Technology
12/22
Structure of VirusProgram V:=
{goto main;
123456;
subroutine infect-executable:=
{loop:
file:=get-random-executable-file;
if(first-line-of-file=123456)
then goto loop
else pretend V to file:}subroutine do-damage:=
{whatever damage is to be done}
subroutine trigger-pulled:=
{stop infecting}
Main: main program:={infect-executable;
if trigger-pulled then do damage;
goto next;}
Next:
}
-
7/30/2019 Virus Technology
13/22
HOW DOES VIRUS WORKS
Enter by email,downloads,floppy disk or hacking
Then make copies of itself to spread.
They will wait for the signal for being activated.
-
7/30/2019 Virus Technology
14/22
-
7/30/2019 Virus Technology
15/22
HOW VIRUSES SPREAD SO
QUICKLY ?
The code written to create a virus is responsible to sprea
the virus in a particular system.
Portable Storage devices
Internet
-
7/30/2019 Virus Technology
16/22
BUGFEEVIRUS
A love letter which is e-mail attachments.
Infection :-
Difficult to open Media files
Difficult to open .jpg , .bmp , .gif etc
-
7/30/2019 Virus Technology
17/22
CASCADE Virus
-
7/30/2019 Virus Technology
18/22
Working Of Cascade Virus
(1)It hides our drives.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\
Dword-NoDrives:=1(2)It locks our window registry.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableRegistrytools:=1(3)Its two attachments deletes *.dll and *.sys
files.
-
7/30/2019 Virus Technology
19/22
LIMITATIONS OF ANTI-VIRUS
PROGRAMS
Trial Versions.
old version cant detect.
License version are so costly.
Regular you have to take virus definitions.
-
7/30/2019 Virus Technology
20/22
CONCLUSION
While using diff. External Data storage devices like cds,
floppy disk scan all the devices using latest updated
anti-virus.
PREVENTION IS ALLWAYES BETTER THAN CURE.
-
7/30/2019 Virus Technology
21/22
BIBLIOGRAPHY
Book :- An Unofficial Guide of Ethical Hacking
Author :- Ankit Fadia
Url:- www.fadia.com
www.hackingmobilephones.com
http://localhost/var/www/apps/conversion/tmp/scratch_2/-http://localhost/var/www/apps/conversion/tmp/scratch_2/-http://localhost/var/www/apps/conversion/tmp/scratch_2/- -
7/30/2019 Virus Technology
22/22