Gurjinder Singh RG1001A26 11007251
Gurjinder Singh RG1001A26 11007251
Gurjinder Singh RG1001A26 11007251
worms
Gurjinder Singh
RG1001A26
11007251
What do you mean by virus
• They are programs which can destroy or
cause damage to data stored on a
computer system and to the computer itself!
• FOR EXAMPLE – If a
program is designed in
such a way, it could open a
THATS WHAT A REAL TROJAN
gateway for hackers to
HORSE LOOKS LIKE!
control and attack the
computer of the user, then
that program is said to be
a Trojan horse
Virus Examples
• Office Macro Virus – A never ending
threat!
• Pakistani Flu – First PC virus, used FAT
boot sector on disks (1986)
• Michelangelo – Boot sector Virus (1991)
• Chernobyl – Spread through windows
Portable Executables (1998)
• Samy – A virus that spreads through
MySpace blurs the boundaries (2005)
Worms – Examples
• Morris Worm – The original gangster, originally
intended to gauge size of internet… whoops!
(1988)
• 1260 – Polymorphic worm, first member of the
chameleon family (1990)
• Code Red – HACKED BY CHINESE! Stupid
worm, incredible results… created Botnet’s for
DoS attacks (2001)
• Storm Worm – Starting Jan 2007, largest
Botnet ever being assembled! The storm is
coming! (2007)
Trojan – Examples
• Road Apples – Using a physical medium
to distribute a Trojan (such as leaving a
USB key or floppy disk on the ground,
hoping someone will plug it in)
• WMFS – A curious design decision by
Microsoft allowed windows meta files
(WMF) to run arbitrary code… much
hackaged ensued
• AIDS – A trojan that used cryto-extortion to
(allegedly) raise money for AIDS research
(1989)
Types of Trojan horse payloads
• Remote Excess Trojans
• Data Sending Trojans
• Destructive Trojans
• Proxy Trojans
• FTP Trojans
• security software disabler Trojans
• denial-of-service attack (DOS) Trojans
Types of virus
• Resident Viruses
• Direct Action Viruses
• Overwrite Viruses
• Boot Virus
• Macro Virus
• Directory Virus
• Polymorphic Virus
• Resident Viruses:-This type of virus is a
permanent which dwells in the RAM
memory. From there it can overcome and
interrupt all of the operations executed by
the system: corrupting files and programs
that are opened, closed, copied, renamed
etc.
Examples include: Randex, CMJ, Meve,
and MrKlunky.
• Direct Action Viruses
The main purpose of this virus is to replicate
and take action when it is executed. When a
specific condition is met, the virus will go into
action and infect files in the directory or folder
that it is in and in directories that are specified
in the AUTOEXEC.BAT file PATH. This batch
file is always located in the root directory of the
hard disk and carries out certain operations
when the computer is booted.
• Overwrite Viruses
Virus of this kind is characterized by the
fact that it deletes the information
contained in the files that it infects,
rendering them partially or totally useless
once they have been infected.
The only way to clean a file infected by an
overwrite virus is to delete the file
completely, thus losing the original
content.
Examples of this virus include: Way,
Trj.Reboot, Trivial.88.D.
Boot Virus
This type of virus affects the boot sector of a
floppy or hard disk. This is a crucial part of a
disk, in which information on the disk itself is
stored together with a program that makes it
possible to boot (start) the computer from the
disk.