13
Now System goes Down…......:D

Virus and worms analysis

Embed Size (px)

DESCRIPTION

Its an intro type about the virus & what it does

Citation preview

Page 1: Virus and worms analysis

Now System goes

Down…......:D

Page 2: Virus and worms analysis

Virus:

It is an application that self replicates by injecting its code into other data files.

It spreads and attempts to consume specific targets and are normally executables.

Worm: It copies itself over a network.

It is a program that views the infection point as another computer rather than as other executables files

Define them:……

Page 3: Virus and worms analysis

IRC ICQ Email Attachments Physical Access Browser & email Software

Bugs Advertisements NetBIOS Fake Programs Fake

Programs Untrusted Sites & freeware

Software

Mode of Transmission

Page 4: Virus and worms analysis

Your computer can be infected even if files are

just copied Can be memory or non-memory resident Can be a stealth virus Viruses can carry other viruses Can make the system never show outward

signs Can stay on the computer even if the

computer is formatted.

Properties

Page 5: Virus and worms analysis

In this phase virus

developers decide

When to Infect program

Which programs to infect

Phases1. Infection Phase

Page 6: Virus and worms analysis

Some viruses infect the computer as soon as virus file installed in computer.

Some viruses infect computer at specific date, time or particular event.

TSR viruses loaded into memory & later infect the PCs.

Continued…..

Page 7: Virus and worms analysis

In this phase Virus will:

Delete files.

Replicate itself to another PCs.

Corrupt targets only

2. Attack Phase

Page 8: Virus and worms analysis

Indication

Files have strange name than the normal.

File extensions can also be changed

Program takes longer time to load than the normal.

Computer’s hard drives constantly runs out of free space.

Victim will not be able to open some programs.

Programs getting corrupted without any reasons.

3.

5.

2.

1.

4.

6.

Page 9: Virus and worms analysis

Macro Virus –

Spreads & Infects database files.

File Virus – Infects Executables.

Source Code Virus – Affects & Damage source code.

Network Virus – Spreads via network elements & protocols.

Types Of Virus

Page 10: Virus and worms analysis

Boot Virus –

Infects boot sectors & records.

Shell Virus – Virus Code forms shell around target host’s genuine

program & host it as sub routine.

Terminate & Stay Resident Virus – Remains permanently in the memory during the work

session even after target host is executed & terminated.

Continued…..

Page 11: Virus and worms analysis

Same “last Modified” Date. Overwriting Unused areas of

the .exe files. Killing tasks of Antivirus Software Avoiding Bait files & other

undesirable hosts Making stealth virus Self Modification on each Infection Encryption with variable key. Polymorphic code Polymorphic code

Method to Avoid Detection

Page 12: Virus and worms analysis

Same “last Modified” Date.

In order to avoid detection by users, some viruses employ different kinds of deception.

Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus.

This approach sometimes fool anti-virus s/w

Same Last Modified Date

Page 13: Virus and worms analysis

Bait files (or goat files) are files that are

specially created by anti-virus software, or by anti-virus professionals themselves, to be infected by a virus.

Many anti-virus programs perform an integrity check of their own code.

Infecting such programs will therefore increase the likelihood that the virus is detected.

Anti-virus professionals can use bait files to take a sample of a virus

Avoid .Bat Files