SlideShare a Scribd company logo
1 of 26
Learning
  MALWARE !
for fun and profit
                SRINU
              sr1nu@ymail.com
What is malware?


   Types of malwares.


    How to create your own malware (Educational purpose only)


   Writing signatures to antiviruses.


Evading antiviruses. (Educational purpose only)
What is a malware ?
              Malware short for malicious software .
malware is a piece of software that is designed to
disrupt operation , gather information , gain
unauthorized access to system resources, and for
exploitation purposes.
               The malware is a general term used by a
computer professionals to mean a variety of forms of
hostile , intrusive, or annoying software or
programming code.
               In simply malware is a set of instructions
that run on your computer and make your system do
something that an attacker wants it to do.
Types of malware
There are many types of malwares are there.
most common are :
  Viruses
  Worms
  Rootkits
  Trojans
  Backdoors
  Spyware
  Keylogger
  Adware
  Crimeware
  Scareware
This list goes on …………………
What is a Virus?
A computer virus is a program that can replicate
itself and spread from one computer to another.
                    if a computer program is called as
a virus it most have the capability to spread from
one file to another file and one computer to
another computer by means of Network or internet
or carried it by a removable devices like
CD’s, DVD’s, Floppy disks and USB devices.
                   in simply virus is a program that
can infect other programs by modifying them to
include a, possibly evolved, version of itself.
Indications of Virus attack
Hard drive is accessed even when not using
the computer.
Computer freezes frequently or encounters
errors.
Computer slows down when programs starts.
Files and Folders are missing (god has to know
what happened to files).
Unable to load operating system files.
Browser window freezes.
When computer get infected by Viruses

 Don’t having proper antivirus application.
 Not updating antivirus and operating system
 and applications.
 Installing pirated software's and rouge
 applications.
 Opening an infected E-Mail attachments.
How to create your own Virus
 (Educational purpose only)




   DEMO
What is a Worm
A computer worm is a self-replicating malware
which uses a computer network to send copies of
itself to another computer.
             However, a computer worm does not
need to attach itself to a program in your system
like a computer virus does in order to function.
             A computer worm generally localizes its
damage to the computer network by causing
increased bandwidth(only applicable to old worm
types )
Indications of worm attacks
• Unusual network traffic in pc
• Not able to visit websites due to bandwidth is
  flooded by worm.
• Unusual files in network shares.
• Unable to update antiviruses.
How Worm spreads



 Peer 2 peer
    (p2p)       Infected USB   Network
                                         Emails
networks like      devices.    shares.
  uTorrent.
How to create your own Worm
  (Educational purpose only)




   DEMO
Rootkit

               Rootkit is a stealthy type of
malware designed to hide its existence from
processes viewer and other monitor software's.
Types of rootkits
• There are two different types of rootkits. they
  are :
   – User Mode rootkit                       User Mode

   – Kernel Mode rootkit



                   Supervisor /
                   Kernel Mode
Backdoors
• A Backdoor is a way in to the system that
  allows an attacker to access the victim
  machine.
• after penetrating the victim machine the
  attacker installs the backdoor in it.
• it used to access the victim machine.

• Example: NetCat
Backdoor !!!!




Hey got the
backdoor.
       PWNED
Trojan
• Trojan is a piece of software which contains
  both legitimate code and malicious code.
• performs covert and overt actions.
• Frequently embedded in applets, games and
  email attachments.
• Examples
        – Beast
        – ProRat
Small story about Trojan
How to create your own Trojan
  (Educational purpose only)




   DEMO
Best Tips to Defend Against Malware
                                Protect your
                               computer with
                               strong security
                                software and
                               keep updated.



                                                               Enable
       Back up your                                          automatic
      files regularly.                                       Windows
                                                              updates.




                                                    Be careful
                   Beware of
                                                 when engaging
                  spam-based
                                                 in peer-to-peer
                    phishing
                                                    (P2P) file-
                   schemes.
                                                     sharing.
Writing signatures to antiviruses
     Mostly antivirus signature writers use
three methods to create signatures
   They are:
             MD5 hashes
             Byte code
             Heuristic
Again
DEMO
Evading Antiviruses


  Again
An Awesome
DEMO 
Any Queries
Special
        Thanks
          to




Imran             Raghu




        chaitu

More Related Content

What's hot (20)

Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Introduction to computer virus
Introduction to computer virusIntroduction to computer virus
Introduction to computer virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus & Anti Virus ppt
Virus & Anti Virus pptVirus & Anti Virus ppt
Virus & Anti Virus ppt
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
The Way Virus Spread
The Way Virus SpreadThe Way Virus Spread
The Way Virus Spread
 
Wikis 1 Assingment
Wikis 1 AssingmentWikis 1 Assingment
Wikis 1 Assingment
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Presentation2
Presentation2Presentation2
Presentation2
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Anti virus
Anti virusAnti virus
Anti virus
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Computer virus
Computer virusComputer virus
Computer virus
 
Avast! antivirus protection
Avast! antivirus protectionAvast! antivirus protection
Avast! antivirus protection
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 

Similar to Learning malware for fun and profit

Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
computer viruses
computer virusescomputer viruses
computer virusesishan2shawn
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 

Similar to Learning malware for fun and profit (20)

Malware
MalwareMalware
Malware
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malicious
MaliciousMalicious
Malicious
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus project
Virus projectVirus project
Virus project
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
computer viruses
computer virusescomputer viruses
computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computervirus
Computervirus Computervirus
Computervirus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Learning malware for fun and profit

  • 1. Learning MALWARE ! for fun and profit SRINU sr1nu@ymail.com
  • 2. What is malware? Types of malwares. How to create your own malware (Educational purpose only) Writing signatures to antiviruses. Evading antiviruses. (Educational purpose only)
  • 3. What is a malware ? Malware short for malicious software . malware is a piece of software that is designed to disrupt operation , gather information , gain unauthorized access to system resources, and for exploitation purposes. The malware is a general term used by a computer professionals to mean a variety of forms of hostile , intrusive, or annoying software or programming code. In simply malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
  • 4. Types of malware There are many types of malwares are there. most common are : Viruses Worms Rootkits Trojans Backdoors Spyware Keylogger Adware Crimeware Scareware This list goes on …………………
  • 5. What is a Virus? A computer virus is a program that can replicate itself and spread from one computer to another. if a computer program is called as a virus it most have the capability to spread from one file to another file and one computer to another computer by means of Network or internet or carried it by a removable devices like CD’s, DVD’s, Floppy disks and USB devices. in simply virus is a program that can infect other programs by modifying them to include a, possibly evolved, version of itself.
  • 6. Indications of Virus attack Hard drive is accessed even when not using the computer. Computer freezes frequently or encounters errors. Computer slows down when programs starts. Files and Folders are missing (god has to know what happened to files). Unable to load operating system files. Browser window freezes.
  • 7. When computer get infected by Viruses Don’t having proper antivirus application. Not updating antivirus and operating system and applications. Installing pirated software's and rouge applications. Opening an infected E-Mail attachments.
  • 8. How to create your own Virus (Educational purpose only) DEMO
  • 9. What is a Worm A computer worm is a self-replicating malware which uses a computer network to send copies of itself to another computer. However, a computer worm does not need to attach itself to a program in your system like a computer virus does in order to function. A computer worm generally localizes its damage to the computer network by causing increased bandwidth(only applicable to old worm types )
  • 10. Indications of worm attacks • Unusual network traffic in pc • Not able to visit websites due to bandwidth is flooded by worm. • Unusual files in network shares. • Unable to update antiviruses.
  • 11. How Worm spreads Peer 2 peer (p2p) Infected USB Network Emails networks like devices. shares. uTorrent.
  • 12.
  • 13. How to create your own Worm (Educational purpose only) DEMO
  • 14. Rootkit Rootkit is a stealthy type of malware designed to hide its existence from processes viewer and other monitor software's.
  • 15. Types of rootkits • There are two different types of rootkits. they are : – User Mode rootkit User Mode – Kernel Mode rootkit Supervisor / Kernel Mode
  • 16. Backdoors • A Backdoor is a way in to the system that allows an attacker to access the victim machine. • after penetrating the victim machine the attacker installs the backdoor in it. • it used to access the victim machine. • Example: NetCat
  • 17. Backdoor !!!! Hey got the backdoor. PWNED
  • 18. Trojan • Trojan is a piece of software which contains both legitimate code and malicious code. • performs covert and overt actions. • Frequently embedded in applets, games and email attachments. • Examples – Beast – ProRat
  • 20. How to create your own Trojan (Educational purpose only) DEMO
  • 21. Best Tips to Defend Against Malware Protect your computer with strong security software and keep updated. Enable Back up your automatic files regularly. Windows updates. Be careful Beware of when engaging spam-based in peer-to-peer phishing (P2P) file- schemes. sharing.
  • 22. Writing signatures to antiviruses Mostly antivirus signature writers use three methods to create signatures They are: MD5 hashes Byte code Heuristic
  • 24. Evading Antiviruses Again An Awesome DEMO 
  • 26. Special Thanks to Imran Raghu chaitu