SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
CompTIA Security +
Abolfazl Naderi
Naderi.traning@gmail.com
3.1 Malware
 Adware
 Virus
 Worm
 Spyware
 Trojan
 Rootkits
 Backdoors
 Botnets
 Ransomware
What is Malware?
 Type of threats
 “mal” refer to malicious and “ware’ refer to
Software
 Malicious computer software or piece of
software
 Damage or disturb system
 Before 1990 malicious software was referred
to as computer viruses
 Book : “art of computer virus research and
defense” by “Peter Szor”
Total malware trend
New malware trend
Adware
 Adware's have some purpose :
 Advertising
 Steal browser information
 Adware example :
 AbetterInternet
 CoolWebSearch
 ShopAtHomeSelect
Virus
 Malicious computer program.
 Without permission or knowledge of the user.
 Attach to files.
 Need to execute by user.
 Some latest virus : I Love you, Melissa, Code Red, …
Worm
 Standalone Malicious computer program.
 All device that understand TCP/IP like router can infected.
 Don’t need a host file for attach.
 Self Replication.
 Don’t need to execute by user.
 Move over the network.
Worm vs Virus
Spyware
 Malicious computer program
 Gather information and send for others
 Tracking and storing Internet users' movements
 Software / Hardware (key logger)
Trojan
 Trojan refer to wooden horse that the Greeks used to enter the city of Troy
 Malicious computer program
 hide within seemingly harmless programs
 Don’t be replicate by other files and computer
 Trojan doing this :
 Creating backdoors
 Spying
 Turn your computer into a Zombie
 Delete / modify / block / copy Data
Rootkit
 Malicious computer software or set of software
 Rootkits are generally associated with other malwares (Trojans, worms, viruses).
 Using some of the lower layers of the operating system than very difficult to detect
 A rootkit active when a system boots up
 Rootkits are most dangerous malware.
 Don’t replicate to other file or computer
Backdoor
 Access to a computer program that bypasses security mechanisms
 Backdoor is :
 A hidden part of program
 A separate program
 A hardware feature
 Some of famous vendor use backdoor :
 Fortinet, 2016
 Juniper, 2015
 Cisco et al, 2013
 Borland InterBase backdoor, 2001
 Barracuda
Botnet
Ransomware
 takes files on a PC or storage by encrypts them, and then extorts money to unlock the files.
 Type of ransomware :
 Encrypting ransomware (CryptoLocker, CryptoWall, …)
 Locker ransomware (WinLocker, …)

Más contenido relacionado

La actualidad más candente

La actualidad más candente (19)

Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Ppt123
Ppt123Ppt123
Ppt123
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Firewall
FirewallFirewall
Firewall
 
Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez Internet Threats: Carlo Alvarez
Internet Threats: Carlo Alvarez
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Malwares
MalwaresMalwares
Malwares
 
Internet threat
Internet threatInternet threat
Internet threat
 
MALWARE
MALWAREMALWARE
MALWARE
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Internet security
Internet securityInternet security
Internet security
 
Dickmaster
DickmasterDickmaster
Dickmaster
 

Destacado

ISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFAshley Faciane
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
How would you find what you can't see?
How would you find what you can't see?How would you find what you can't see?
How would you find what you can't see?pinkflawd
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?amiable_indian
 

Destacado (8)

File000145
File000145File000145
File000145
 
ISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDF
 
CRM, Technology and Fitness
CRM, Technology and FitnessCRM, Technology and Fitness
CRM, Technology and Fitness
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
How would you find what you can't see?
How would you find what you can't see?How would you find what you can't see?
How would you find what you can't see?
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?Vulnerability Scanning or Penetration Testing?
Vulnerability Scanning or Penetration Testing?
 

Similar a Malwares

Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,Kahir_alrawi
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
Harmful software
Harmful softwareHarmful software
Harmful softwareBijoKG2
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...eLiberatica
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 

Similar a Malwares (20)

Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
All about viruse,Malwares,
All about viruse,Malwares,All about viruse,Malwares,
All about viruse,Malwares,
 
All about viruses
All about virusesAll about viruses
All about viruses
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Harmful software
Harmful softwareHarmful software
Harmful software
 
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand..."Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
 
Information security
Information securityInformation security
Information security
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer security
Computer securityComputer security
Computer security
 
Malware
MalwareMalware
Malware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
computer security
computer securitycomputer security
computer security
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 

Último

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Último (20)

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Malwares

  • 1. CompTIA Security + Abolfazl Naderi Naderi.traning@gmail.com
  • 2. 3.1 Malware  Adware  Virus  Worm  Spyware  Trojan  Rootkits  Backdoors  Botnets  Ransomware
  • 3. What is Malware?  Type of threats  “mal” refer to malicious and “ware’ refer to Software  Malicious computer software or piece of software  Damage or disturb system  Before 1990 malicious software was referred to as computer viruses  Book : “art of computer virus research and defense” by “Peter Szor”
  • 6. Adware  Adware's have some purpose :  Advertising  Steal browser information  Adware example :  AbetterInternet  CoolWebSearch  ShopAtHomeSelect
  • 7. Virus  Malicious computer program.  Without permission or knowledge of the user.  Attach to files.  Need to execute by user.  Some latest virus : I Love you, Melissa, Code Red, …
  • 8. Worm  Standalone Malicious computer program.  All device that understand TCP/IP like router can infected.  Don’t need a host file for attach.  Self Replication.  Don’t need to execute by user.  Move over the network.
  • 10. Spyware  Malicious computer program  Gather information and send for others  Tracking and storing Internet users' movements  Software / Hardware (key logger)
  • 11. Trojan  Trojan refer to wooden horse that the Greeks used to enter the city of Troy  Malicious computer program  hide within seemingly harmless programs  Don’t be replicate by other files and computer  Trojan doing this :  Creating backdoors  Spying  Turn your computer into a Zombie  Delete / modify / block / copy Data
  • 12. Rootkit  Malicious computer software or set of software  Rootkits are generally associated with other malwares (Trojans, worms, viruses).  Using some of the lower layers of the operating system than very difficult to detect  A rootkit active when a system boots up  Rootkits are most dangerous malware.  Don’t replicate to other file or computer
  • 13. Backdoor  Access to a computer program that bypasses security mechanisms  Backdoor is :  A hidden part of program  A separate program  A hardware feature  Some of famous vendor use backdoor :  Fortinet, 2016  Juniper, 2015  Cisco et al, 2013  Borland InterBase backdoor, 2001  Barracuda
  • 15. Ransomware  takes files on a PC or storage by encrypts them, and then extorts money to unlock the files.  Type of ransomware :  Encrypting ransomware (CryptoLocker, CryptoWall, …)  Locker ransomware (WinLocker, …)