Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.

Similar presentations


Presentation on theme: "1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel."— Presentation transcript:

1 1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel

2 ECE 4883 - Internetwork Security 2 Outline Definitions Categories of Spyware Lab material

3 ECE 4883 - Internetwork Security 3 Definitions Malware is a malicious software designed specifically to disrupt or harm a computer system Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent

4 ECE 4883 - Internetwork Security 4 Notorious Spyware Gator One of the most annoying Bargain Buddy Finds you bargains, records your profile Various Internet SearchBars Search Bar that records every move

5 ECE 4883 - Internetwork Security 5 How did my computer get infected? Bundled Spyware  Often included in Free/Shareware  Kazaa, iMesh, and etc  Installs more than what it promises  Sometimes mentioned in the agreement form

6 ECE 4883 - Internetwork Security 6 How did my computer get infected? Tricky and dishonest Installers

7 ECE 4883 - Internetwork Security 7 How did my computer get infected? You can buy them!  Shady companies sell their software with extra *special features –For instance, a Child Monitor program for Internet Browsing that also monitors you.

8 ECE 4883 - Internetwork Security 8 Types of Spyware Adware  Annoying Pop-up Ads  Profiles online surfing and spending habits  Tailors Ads based on profile Even when you uninstall the program that installed the Adware, the Adware usually sticks around

9 ECE 4883 - Internetwork Security 9 Types of Spyware Snoopware  Sometimes sold as Child monitor  Keeps track of your internet history Keylogger  Records keystrokes to obtain password, credit card numbers, and sensitive information

10 ECE 4883 - Internetwork Security 10 Some Simple Solutions Firewall Anti-popup Browser feature Paying closer attention Not downloading shady software and being careful when downloading

11 ECE 4883 - Internetwork Security 11 Privacy Software Ad-Aware, Spybot Search and Destroy  Searches RAM, Windows Registry, external storage for known data-mining, tracking, adware, malware  Live update tool which downloads the latest signatures from their web servers

12 ECE 4883 - Internetwork Security 12 Lab Material Install a Spyware  Observe the effects –Extra “features” installed –Registry changed –Cookie monitoring internet history  Ad-Aware –Learn the capabilities –Undo the damage

13 ECE 4883 - Internetwork Security 13 Lab Material Get your credit card number stolen!

14 ECE 4883 - Internetwork Security 14 Lab Material Keylogging Code  Examine a custom keylogger written in C –Try to figure out what the code does  Learn how keylogging is done in Windows –WH_KEYBOARD message Hook

15 ECE 4883 - Internetwork Security 15 Future Addition Monitor the behavior of Spyware on network VC6 project files available for Keylogger  Add features for non-evil educational purpose  (i.e. Override User Input, Jumble keys)

16 ECE 4883 - Internetwork Security 16 References www.spywareguide.com www.wikipedia.com www.lavasoft.de www.claria.com www.codeguru.com www.amazon.com


Download ppt "1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel."

Similar presentations


Ads by Google