Вы находитесь на странице: 1из 22

SUBMITTED BY

Zamirahmed (08CE216)

GANDHINAGAR INSTITUTE OF TECNOLOGY

INDEX
1. Introduction of Malicious Programs. 2. Introduction of Virus 3. Types of Viruses. 4. Structure Of Virus 5. Working style of Virus. 6. Symptoms Of virus infecting. 7. How it spreads so quickly. 8. Example-Bugfee,Cascade(Virus) 9. Limitations of Anti-Viruses. 10. Conclusion. 11. Bibliography

What is Computer Virus ?


File :- (1)Courrpt installed Softwares (2)Avoid Detection (3)Infect Files

Classification Of Virus
Viruses
File/Program Viruses Boot Sector Viruses Multipartie Viruses Stealth Viruses

Macro Viruses

Polymor phic Viruses

Floppy Disk Boot Sector Viruses

Hard Disk Master Boot Record (MBR)/ Partition Table Viruses

File/Program Viruses
Purpose:- To infect installed Program and system files. Speciality:-They load viruses into memory. Examples:-Sunday,Cascade

Boot Sector Viruses


Types :- (1) Floppy Disk Boot Sector Viruses
(2) Hard Disk Master Boot Record (MBR)/ Partition Table Viruses

Speciality:-It copies the master boot record to another place or overwrites on it.

Multipartite Viruses

Hybrid Varity-combination of boot virus


and file Program, virus. First it goes to master boot program .then it replaces or overwrites it and then start infecting files.

Stealth Viruses
Very latest viruses. they themselves to

HIDE itself. They sometimes REMOVES temporary

avoid to be detected.

(Compression)

Macro Viruses
A set of many destructive instructions made in VB.

(Visual Basic).They are email file attachments.


For a macro viruses to infect a system, the document with the embedded VB code, must be opened.

Polymorphic Viruses

Most Difficult to detect. it

makes copies

of it in registry. so the whole system is being infected by this virus.

Structure of Virus
Program V:= {goto main; 123456;

Main:

subroutine infect-executable:= {loop: file:=get-random-executable-file; if(first-line-of-file=123456) then goto loop else pretend V to file:} subroutine do-damage:= {whatever damage is to be done} subroutine trigger-pulled:= {stop infecting} main program:= {infect-executable; if trigger-pulled then do damage; goto next;}

Next: }

HOW DOES VIRUS WORKS

Enter by email,downloads,floppy disk or hacking Then make copies of itself to spread. They will wait for the signal for being activated.

SYMPTOMS OF A VIRUS INFECTION


1. 2. 3. 4. Unusual text will appear. Program and data file suddenly corrupted. Your computer goes slowdown. System asks for hardware device driver often.

HOW VIRUSES SPREAD SO QUICKLY ?

The code written to create a virus is responsible to spread the virus in a particular system. Portable Storage devices Internet

BUGFEE VIRUS
A love letter which is e-mail attachments. Infection :Difficult to open Media files Difficult to open .jpg , .bmp , .gif etc

CASCADE Virus

Working Of Cascade Virus


(1)It hides our drives. HKEY_CURRENT_USER\Software\Microsoft\Wind ows\CurrentVersion\Policies\Explorer\ Dword-NoDrives:=1 (2)It locks our window registry. HKEY_CURRENT_USER\Software\Microsoft\Wind ows\CurrentVersion\Policies\System DisableRegistrytools:=1 (3)Its two attachments deletes *.dll and *.sys files.

LIMITATIONS OF ANTI-VIRUS PROGRAMS


Trial Versions. old version cant detect. License version are so costly. Regular you have to take virus definitions.

CONCLUSION
While using diff. External Data storage devices like cds,
floppy disk scan all the devices using latest updated anti-virus.

PREVENTION IS ALLWAYES BETTER THAN CURE.

BIBLIOGRAPHY

Book :- An Unofficial Guide of Ethical Hacking Author :- Ankit Fadia Url:www.fadia.com www.hackingmobilephones.com

Вам также может понравиться