Viruses, Worms, Trojans. Where are we going? Absurd opinions by: IcE tRe.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Lecturer: Fadwa Tlaelan
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 18 Data Security 1.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Computer Viruses.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
How do worms work? Vivek Ramachandran Nagraj – An Indian comic book hero, who commands all the snakes of the world.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
CERN’s Computer Security Challenge
1 ISA 662 Information System Security 20 Years Of PC Viruses.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Honeypot and Intrusion Detection System
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
We are here to help you… Fight something like this Brownies !
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Understand Malware LESSON Security Fundamentals.
Computer virus Done: Aaesha Mohammed ID: H
1 3 Computing System Fundamentals 3.7 Utility Software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Malware and Computer Maintenance
Intro to Malware Attacks
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Introduction to Internet Worm
Presentation transcript:

Viruses, Worms, Trojans. Where are we going? Absurd opinions by: IcE tRe

Past Viruses Elk Cloner Stoned Michelangelo / Media Darlings Good Times virus

Elk Cloner “The program with personality. –I–It will get on all your disks. It will infiltrate your chips. Yes it’s Cloner. –I–It will stick to you like glue. It will modify ram too. Send in the cloner!” First virus in the wild. Coded and ran on an Apple ][e. No damaging payload. No real threat.

Stoned Simple boot block virus. Code is the basis of most boot block viruses including the monkey. Which was much more damaging. No real damaging payload. Cute messages displayed upon bootup. Much like Elk Cloner.

Michelangelo / Media Darlings Few infections of actual virus where seen. Media attention actually more damaging then the virus could actually be. Media caused unrealistic expectations of the virus. Only to crash those expectations causing later warnings not to be taken seriously. No actual damage occurred contrary to Press predictions. Result the first and last virus to receive such attention. This could be conceived as both good and bad.

Good Times

Recent Viruses Nimda My Doom Sasser MS Blaster

Nimda The Good –Multidistribution virus, uses damn near any method it can get ahold of to try to proliferate, even !fileshares! –Fairly inteligent, walks through the filesystem looking for stuff it can use.. –Infects websites, changing the index to refer to an infected file, which loads the virus. Website looks the same, but loads the virus.. SMART!!! The Bad –Once again! No ambition, it just proliferates. It really doesn't do much of anything other than spread.. –I mean seriously what if nimbda had a nasty payload, say something simple but damaging; like destroying the filesystem on the hard drive. –Wow, considering how widespread this virus this was, there'd be alot of people with bad hdds

My Doom The Good –In my opinion about as good of a virus as blaster. –Opens a backdoor, this could be useful! –Spreads through , Kazza ddos SCO... Good, they deserve it! –expiration date: great idea really.. These things don't live forever, and there's a good reason for it. –Why assume as the writer that it's going to live forever.. –Diversionary tactic! Load notepad, and show garbage! The Bad –I mean really, is it actually needed to have 71 ports open for your backdoor? –S'allright, I am sure no one will notice anyways... –Polymorphic; is it really that hard to change the data in the virus enough to not be detected by simple regexes on the mail server? –Still a real lack of ambition here. While sco is a worthy cause, I mean really, is this all we can come up with? –Retalitory attacks on a terrible company?

Sasser The Good –Similar to blaster, used a lsass vuln to overcome the system same conditions really, just need a machine that's on the network and alive and kicking –written in C++ WOw! it's like an actual program and shit! The Bad –Yes, while similar to blaster, it's just lame. uses what could be a potential invisible hole in the user subsystem and then makes little to no attempts to hide itself from the end user. –Exploit causes alert to user about lsass crashing.. Well there goes low profile.. –Opens FTP on port eeek! –Opens a shell on port However will the targets ISP ever find us? –FTP sessions are logged in C:/win.log Great, why not leave your name and phone number at the beep while your at it.. –Rather quick infection times, so estimated at 8 minutes to encompass the globe. While impressive at first, with rates like this how long did it take before CNN reported on it..

Ms Blaster The Good –Requires nothing other than a vulnerable machine and a network connection. –Incredibly prolific, took very little time to spread across the world –Opens backdoor used mostly already used ports to proliferate; ie 445 and 135. –So even when it was noticed that something was up it was very hard to dertermine what it was. The Bad –So prolific, that it called attention to itself, both in sessions spawned and network traffic spikes. –No real payload other than a lame DDOS that was mitigated on the DNS level by most ISP's and then –Left a backdoor open on a noticable port (4444)

MS Blaster Infected !

Viruses in the Future The main problem with todays viruses is simple greed. Attaining to much attention to quickly usually ends up alerting both the users and the media They could really use it to their advantage.

In the Future Scan host A for vulnerability 1. Scan host B for vulnerability 2 Scan host C for vulnerability 3

Scan host A for vulnerability 1. Scan host C for vulnerability 1 Infected ! Host B has been patched and can not be infected

Biblography / Sources Groups.google.com fsecur.com