Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

Virus by ChintanGurjar

VIEWS: 0 PAGES: 22

This is a virus seminar presented by me somewhere in some college. So for a newbibe in security field, it can be a handy material.

More Info
									                 SUBMITTED BY
                Zamirahmed (08CE216)

GANDHINAGAR INSTITUTE OF
      TECNOLOGY
               INDEX
1. Introduction of Malicious Programs.
2. Introduction of Virus
3. Types of Viruses.
4. Structure Of Virus
5. Working style of Virus.
6. Symptoms Of virus infecting.
7. How it spreads so quickly.
8. Example-Bugfee,Cascade(Virus)
9. Limitations of Anti-Viruses.
10. Conclusion.
11. Bibliography
    What is Computer Virus ?


File :- (1)Courrpt installed Softwares
         (2)Avoid Detection
         (3)Infect Files
       Classification Of Virus

                               Viruses


File/Program        Boot       Multipartie   Stealth   Macro     Polymor
   Viruses         Sector       Viruses      Viruses   Viruses     phic
                   Viruses                                        Viruses



        Floppy               Hard Disk
       Disk Boot              Master
                               Boot
        Sector
                              Record
        Viruses               (MBR)/
                             Partition
                               Table
                              Viruses
     File/Program Viruses

Purpose:- To infect installed Program
          and system files.
Speciality:-They load viruses into memory.

Examples:-Sunday,Cascade
             Boot Sector Viruses

 Types :- (1) Floppy Disk Boot Sector Viruses

         (2) Hard Disk Master Boot Record
             (MBR)/ Partition Table Viruses


Speciality:-It copies the master boot record to
            another place or overwrites on it.
           Multipartite Viruses

Hybrid Varity-combination of boot virus
                       and file Program, virus.

First it goes to master boot program .then it
replaces or overwrites it and then start infecting
files.
                Stealth Viruses

               HIDE itself. They
Very latest viruses. they

sometimes REMOVES temporary
themselves to


avoid to be detected. (Compression)
             Macro Viruses

A set of many destructive instructions made in VB.
(Visual Basic).They are email file
 attachments.
For a macro viruses to infect a system, the
document with the embedded VB code, must be
opened.
           Polymorphic Viruses


Most Difficult to detect. it   makes copies
of it in registry. so the whole system is being

infected by this virus.
            Structure of Virus
Program V:=
{goto main;
        123456;
                  subroutine infect-executable:=
                  {loop:
                   file:=get-random-executable-file;
                   if(first-line-of-file=123456)
                                       then goto loop
                                        else pretend V to file:}
                  subroutine do-damage:=
                   {whatever damage is to be done}
                  subroutine trigger-pulled:=
                     {stop infecting}
Main:   main program:=
        {infect-executable;
         if trigger-pulled then do damage;
         goto next;}
Next:
}
  HOW DOES VIRUS WORKS


 Enter by email,downloads,floppy disk or hacking

 Then make copies of itself to spread.

 They will wait for the signal for being activated.
     SYMPTOMS OF A VIRUS
          INFECTION
1.    Unusual text will appear.
2.    Program and data file suddenly corrupted.
3.    Your computer goes slowdown.
4.    System asks for hardware device driver often.
  HOW VIRUSES SPREAD SO
       QUICKLY ?
The code written to create a virus is responsible to spread
 the virus in a particular system.

Portable Storage devices

Internet
          “BUGFEE” VIRUS
 A love letter which is e-mail attachments.

Infection :-
Difficult to open Media files
 Difficult to open .jpg , .bmp , .gif etc
CASCADE Virus
      Working Of Cascade Virus
(1)It hides our drives.
HKEY_CURRENT_USER\Software\Microsoft\Wind
  ows\CurrentVersion\Policies\Explorer\
Dword-NoDrives:=1
(2)It locks our window registry.
HKEY_CURRENT_USER\Software\Microsoft\Wind
  ows\CurrentVersion\Policies\System
DisableRegistrytools:=1
(3)Its two attachments deletes *.dll and *.sys
  files.
   LIMITATIONS OF ANTI-VIRUS
          PROGRAMS

Trial Versions.
 old version can’t detect.
License version are so costly.
 Regular you have to take virus definitions.
                  CONCLUSION

While using diff. External Data storage devices like cd’s,
floppy disk scan all the devices using latest updated
anti-virus.




 “PREVENTION IS ALLWAYES BETTER THAN CURE”.
               BIBLIOGRAPHY



Book :- An Unofficial Guide of Ethical Hacking
Author :- Ankit Fadia
Url:-     www.fadia.com
          www.hackingmobilephones.com

								
To top