Академический Документы
Профессиональный Документы
Культура Документы
Zamirahmed (08CE216)
INDEX
1. Introduction of Malicious Programs. 2. Introduction of Virus 3. Types of Viruses. 4. Structure Of Virus 5. Working style of Virus. 6. Symptoms Of virus infecting. 7. How it spreads so quickly. 8. Example-Bugfee,Cascade(Virus) 9. Limitations of Anti-Viruses. 10. Conclusion. 11. Bibliography
Classification Of Virus
Viruses
File/Program Viruses Boot Sector Viruses Multipartie Viruses Stealth Viruses
Macro Viruses
File/Program Viruses
Purpose:- To infect installed Program and system files. Speciality:-They load viruses into memory. Examples:-Sunday,Cascade
Speciality:-It copies the master boot record to another place or overwrites on it.
Multipartite Viruses
Stealth Viruses
Very latest viruses. they themselves to
avoid to be detected.
(Compression)
Macro Viruses
A set of many destructive instructions made in VB.
Polymorphic Viruses
makes copies
Structure of Virus
Program V:= {goto main; 123456;
Main:
subroutine infect-executable:= {loop: file:=get-random-executable-file; if(first-line-of-file=123456) then goto loop else pretend V to file:} subroutine do-damage:= {whatever damage is to be done} subroutine trigger-pulled:= {stop infecting} main program:= {infect-executable; if trigger-pulled then do damage; goto next;}
Next: }
Enter by email,downloads,floppy disk or hacking Then make copies of itself to spread. They will wait for the signal for being activated.
The code written to create a virus is responsible to spread the virus in a particular system. Portable Storage devices Internet
BUGFEE VIRUS
A love letter which is e-mail attachments. Infection :Difficult to open Media files Difficult to open .jpg , .bmp , .gif etc
CASCADE Virus
CONCLUSION
While using diff. External Data storage devices like cds,
floppy disk scan all the devices using latest updated anti-virus.
BIBLIOGRAPHY
Book :- An Unofficial Guide of Ethical Hacking Author :- Ankit Fadia Url:www.fadia.com www.hackingmobilephones.com