SlideShare a Scribd company logo
1 of 26
Learning
  MALWARE !
for fun and profit
                SRINU
              sr1nu@ymail.com
What is malware?


   Types of malwares.


    How to create your own malware (Educational purpose only)


   Writing signatures to antiviruses.


Evading antiviruses. (Educational purpose only)
What is a malware ?
              Malware short for malicious software .
malware is a piece of software that is designed to
disrupt operation , gather information , gain
unauthorized access to system resources, and for
exploitation purposes.
               The malware is a general term used by a
computer professionals to mean a variety of forms of
hostile , intrusive, or annoying software or
programming code.
               In simply malware is a set of instructions
that run on your computer and make your system do
something that an attacker wants it to do.
Types of malware
There are many types of malwares are there.
most common are :
  Viruses
  Worms
  Rootkits
  Trojans
  Backdoors
  Spyware
  Keylogger
  Adware
  Crimeware
  Scareware
This list goes on …………………
What is a Virus?
A computer virus is a program that can replicate
itself and spread from one computer to another.
                    if a computer program is called as
a virus it most have the capability to spread from
one file to another file and one computer to
another computer by means of Network or internet
or carried it by a removable devices like
CD’s, DVD’s, Floppy disks and USB devices.
                   in simply virus is a program that
can infect other programs by modifying them to
include a, possibly evolved, version of itself.
Indications of Virus attack
Hard drive is accessed even when not using
the computer.
Computer freezes frequently or encounters
errors.
Computer slows down when programs starts.
Files and Folders are missing (god has to know
what happened to files).
Unable to load operating system files.
Browser window freezes.
When computer get infected by Viruses

 Don’t having proper antivirus application.
 Not updating antivirus and operating system
 and applications.
 Installing pirated software's and rouge
 applications.
 Opening an infected E-Mail attachments.
How to create your own Virus
 (Educational purpose only)




   DEMO
What is a Worm
A computer worm is a self-replicating malware
which uses a computer network to send copies of
itself to another computer.
             However, a computer worm does not
need to attach itself to a program in your system
like a computer virus does in order to function.
             A computer worm generally localizes its
damage to the computer network by causing
increased bandwidth(only applicable to old worm
types )
Indications of worm attacks
• Unusual network traffic in pc
• Not able to visit websites due to bandwidth is
  flooded by worm.
• Unusual files in network shares.
• Unable to update antiviruses.
How Worm spreads



 Peer 2 peer
    (p2p)       Infected USB   Network
                                         Emails
networks like      devices.    shares.
  uTorrent.
How to create your own Worm
  (Educational purpose only)




   DEMO
Rootkit

               Rootkit is a stealthy type of
malware designed to hide its existence from
processes viewer and other monitor software's.
Types of rootkits
• There are two different types of rootkits. they
  are :
   – User Mode rootkit                       User Mode

   – Kernel Mode rootkit



                   Supervisor /
                   Kernel Mode
Backdoors
• A Backdoor is a way in to the system that
  allows an attacker to access the victim
  machine.
• after penetrating the victim machine the
  attacker installs the backdoor in it.
• it used to access the victim machine.

• Example: NetCat
Backdoor !!!!




Hey got the
backdoor.
       PWNED
Trojan
• Trojan is a piece of software which contains
  both legitimate code and malicious code.
• performs covert and overt actions.
• Frequently embedded in applets, games and
  email attachments.
• Examples
        – Beast
        – ProRat
Small story about Trojan
How to create your own Trojan
  (Educational purpose only)




   DEMO
Best Tips to Defend Against Malware
                                Protect your
                               computer with
                               strong security
                                software and
                               keep updated.



                                                               Enable
       Back up your                                          automatic
      files regularly.                                       Windows
                                                              updates.




                                                    Be careful
                   Beware of
                                                 when engaging
                  spam-based
                                                 in peer-to-peer
                    phishing
                                                    (P2P) file-
                   schemes.
                                                     sharing.
Writing signatures to antiviruses
     Mostly antivirus signature writers use
three methods to create signatures
   They are:
             MD5 hashes
             Byte code
             Heuristic
Again
DEMO
Evading Antiviruses


  Again
An Awesome
DEMO 
Any Queries
Special
        Thanks
          to




Imran             Raghu




        chaitu

More Related Content

What's hot

5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
drewz lin
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
wenxin
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
cheauyih
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Malicious software
Malicious softwareMalicious software
Malicious software
rajakhurram
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 

What's hot (20)

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 

Similar to Learning malware for fun and profit

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
computer viruses
computer virusescomputer viruses
computer viruses
ishan2shawn
 

Similar to Learning malware for fun and profit (20)

Malware
MalwareMalware
Malware
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malicious
MaliciousMalicious
Malicious
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus project
Virus projectVirus project
Virus project
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Learning malware for fun and profit

  • 1. Learning MALWARE ! for fun and profit SRINU sr1nu@ymail.com
  • 2. What is malware? Types of malwares. How to create your own malware (Educational purpose only) Writing signatures to antiviruses. Evading antiviruses. (Educational purpose only)
  • 3. What is a malware ? Malware short for malicious software . malware is a piece of software that is designed to disrupt operation , gather information , gain unauthorized access to system resources, and for exploitation purposes. The malware is a general term used by a computer professionals to mean a variety of forms of hostile , intrusive, or annoying software or programming code. In simply malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
  • 4. Types of malware There are many types of malwares are there. most common are : Viruses Worms Rootkits Trojans Backdoors Spyware Keylogger Adware Crimeware Scareware This list goes on …………………
  • 5. What is a Virus? A computer virus is a program that can replicate itself and spread from one computer to another. if a computer program is called as a virus it most have the capability to spread from one file to another file and one computer to another computer by means of Network or internet or carried it by a removable devices like CD’s, DVD’s, Floppy disks and USB devices. in simply virus is a program that can infect other programs by modifying them to include a, possibly evolved, version of itself.
  • 6. Indications of Virus attack Hard drive is accessed even when not using the computer. Computer freezes frequently or encounters errors. Computer slows down when programs starts. Files and Folders are missing (god has to know what happened to files). Unable to load operating system files. Browser window freezes.
  • 7. When computer get infected by Viruses Don’t having proper antivirus application. Not updating antivirus and operating system and applications. Installing pirated software's and rouge applications. Opening an infected E-Mail attachments.
  • 8. How to create your own Virus (Educational purpose only) DEMO
  • 9. What is a Worm A computer worm is a self-replicating malware which uses a computer network to send copies of itself to another computer. However, a computer worm does not need to attach itself to a program in your system like a computer virus does in order to function. A computer worm generally localizes its damage to the computer network by causing increased bandwidth(only applicable to old worm types )
  • 10. Indications of worm attacks • Unusual network traffic in pc • Not able to visit websites due to bandwidth is flooded by worm. • Unusual files in network shares. • Unable to update antiviruses.
  • 11. How Worm spreads Peer 2 peer (p2p) Infected USB Network Emails networks like devices. shares. uTorrent.
  • 12.
  • 13. How to create your own Worm (Educational purpose only) DEMO
  • 14. Rootkit Rootkit is a stealthy type of malware designed to hide its existence from processes viewer and other monitor software's.
  • 15. Types of rootkits • There are two different types of rootkits. they are : – User Mode rootkit User Mode – Kernel Mode rootkit Supervisor / Kernel Mode
  • 16. Backdoors • A Backdoor is a way in to the system that allows an attacker to access the victim machine. • after penetrating the victim machine the attacker installs the backdoor in it. • it used to access the victim machine. • Example: NetCat
  • 17. Backdoor !!!! Hey got the backdoor. PWNED
  • 18. Trojan • Trojan is a piece of software which contains both legitimate code and malicious code. • performs covert and overt actions. • Frequently embedded in applets, games and email attachments. • Examples – Beast – ProRat
  • 20. How to create your own Trojan (Educational purpose only) DEMO
  • 21. Best Tips to Defend Against Malware Protect your computer with strong security software and keep updated. Enable Back up your automatic files regularly. Windows updates. Be careful Beware of when engaging spam-based in peer-to-peer phishing (P2P) file- schemes. sharing.
  • 22. Writing signatures to antiviruses Mostly antivirus signature writers use three methods to create signatures They are: MD5 hashes Byte code Heuristic
  • 24. Evading Antiviruses Again An Awesome DEMO 
  • 26. Special Thanks to Imran Raghu chaitu