{"id":535,"date":"2019-09-14T12:01:53","date_gmt":"2019-09-14T11:01:53","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=535"},"modified":"2019-09-14T12:50:51","modified_gmt":"2019-09-14T11:50:51","slug":"use-malicious-softwares","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/use-malicious-softwares\/","title":{"rendered":"How to use Malicious Softwares?"},"content":{"rendered":"<div id=\"post-body-317153123671602590\" class=\"post-body entry-content\">\n<div dir=\"ltr\">\n<h3 class=\"post-title entry-title\">What is Malicious Softwares ? What is the type of Malicious Softwares?<\/h3>\n<div class=\"separator\"><a href=\"https:\/\/2.bp.blogspot.com\/-8TcUXgQbGF0\/U9YTbSUs1tI\/AAAAAAAAAjg\/n845r4fIQTE\/s1600\/malicious+softwares.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/2.bp.blogspot.com\/-8TcUXgQbGF0\/U9YTbSUs1tI\/AAAAAAAAAjg\/n845r4fIQTE\/s1600\/malicious+softwares.jpg\" width=\"320\" height=\"264\" border=\"0\" \/><\/a><\/div>\n<h3 class=\"post-title entry-title\"><\/h3>\n<div>\u00a0 Malware is malicious software.\u00a0 This software includes the program that exploits the vulnerabilities in the computing system.\u00a0 Malicious Softwares<\/div>\n<div><\/div>\n<div>The purpose of malicious software is to harm you or steal the information from you.<\/div>\n<div><\/div>\n<div><i><b>Types of\u00a0 Malicious Softwares: (Malicious Softwares)<\/b><\/i><\/div>\n<div>There are three characteristics of malware:1 Self-replicating malware actively attempts to propagate by creating new copies, or instances, of itself. Malware may also be propagated passively, by a user copying it accidentally, for example, but this isn&#8217;t self-replication.<\/p>\n<p>2 The\u00a0<span id=\"IL_AD8\" class=\"IL_AD\">population<\/span> growth of malware describes the overall change in the number of malware instances due to self-replication. Malware that doesn&#8217;t self-replicate will always have a\u00a0<span id=\"IL_AD6\" class=\"IL_AD\">zero population growth<\/span>, but malware with a zero population growth may self-replicate.<\/p>\n<p>3 Parasitic malware requires some other executable code in order to\u00a0<span id=\"IL_AD4\" class=\"IL_AD\">exist<\/span>. &#8220;Executable&#8221; in this context should be taken very broadly to include anything that can be executed, such as boot block code on a disk, binary code<\/p>\n<\/div>\n<div><\/div>\n<div><b>Trojan Horse<\/b>: (Malicious Softwares)<\/div>\n<div><\/div>\n<div class=\"separator\"><a href=\"https:\/\/2.bp.blogspot.com\/-DYTBlt9_DUU\/U9YUGFuQywI\/AAAAAAAAAjo\/6XxBA9ZIG9U\/s1600\/trojan+horse.jpg\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/2.bp.blogspot.com\/-DYTBlt9_DUU\/U9YUGFuQywI\/AAAAAAAAAjo\/6XxBA9ZIG9U\/s1600\/trojan+horse.jpg\" border=\"0\" \/><\/a><\/div>\n<div>\u00a0Self-replicating: no<br \/>\nPopulation growth: zero<br \/>\nParasitic: yes<\/div>\n<div><\/div>\n<div>\n<p>The most famous malicious software is the Trojan Horse.<\/p>\n<p>There was no love lost between the Greeks and the Trojans. The Greeks had<br \/>\nbesieged the Trojans, holed up in the city of Troy, for ten years. They finally<br \/>\ntook the city by using a clever ploy: the Greeks built an enormous wooden horse,<br \/>\nconcealing soldiers inside, and tricked the Trojans into bringing the horse into<br \/>\nTroy. When night fell, the soldiers exited the horse and much unpleasantness<br \/>\nensued.<\/p>\n<p>In computing, a Trojan horse is a program which purports to do some benign<br \/>\ntask, but secretly performs some additional malicious task. A classic example is<br \/>\na password-grabbing login program which prints authentic-looking &#8220;username&#8221;<br \/>\nand &#8220;password&#8221; prompts, and waits for a user to type in the information. When<br \/>\nthis happens, the password grabber stashes the information away for its creator,<br \/>\nthen prints out an &#8220;invalid password&#8221; message before running the real login<br \/>\nprogram. The unsuspecting user thinks they made a typing mistake and reenters<br \/>\nthe information, none the wiser.<\/p>\n<\/div>\n<div><\/div>\n<div><b>Logic Bomb:<\/b><\/div>\n<div><\/div>\n<div class=\"separator\"><b><a href=\"https:\/\/1.bp.blogspot.com\/-K5nS-q_iO4E\/U9YUXWvbt3I\/AAAAAAAAAjw\/cRh6tpUtw1g\/s1600\/logic+bomb.jpg\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-K5nS-q_iO4E\/U9YUXWvbt3I\/AAAAAAAAAjw\/cRh6tpUtw1g\/s1600\/logic+bomb.jpg\" border=\"0\" \/><\/a><\/b><\/div>\n<p>Self-replicating: no<br \/>\nPopulation growth: zero<br \/>\nParasitic: possibly<br \/>\nThe oldest type of malicious software.\u00a0 This program is embedded with some other program.\u00a0 When certain condition meets, the logic bomb will destroy your pc.<br \/>\nIt also crashes at a particular date which is fixed by the attacker.\u00a0 It will be included in a legitimate or authorized person like this:<\/p>\n<div><\/div>\n<div>legitimate code<br \/>\nif the date is Friday the 13th:<br \/>\ncrash_computerO<br \/>\nlegitimate code<\/div>\n<div><\/div>\n<div>\n<p>Eg: if some antivirus trying to delete or clean the logic bomb.\u00a0 The logic bomb will destroy the pc.<\/p>\n<p><b><br \/>\n<\/b><b>Back Door or Trap Door<\/b>:<\/p>\n<\/div>\n<div><\/div>\n<div class=\"separator\"><a href=\"https:\/\/1.bp.blogspot.com\/-kAAciYrLbzc\/U9YUunEJruI\/AAAAAAAAAj4\/Sn5WuKYcRl4\/s1600\/back+door.jpg\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/1.bp.blogspot.com\/-kAAciYrLbzc\/U9YUunEJruI\/AAAAAAAAAj4\/Sn5WuKYcRl4\/s1600\/back+door.jpg\" border=\"0\" \/><\/a><\/div>\n<div>\u00a0Self-replicating: no<br \/>\nPopulation growth: zero<br \/>\nParasitic: possiblyA back door is any mechanism which bypasses a normal security check. Programmers sometimes create back doors for legitimate reasons, such as skipping a time-consuming authentication process when debugging a network server. As with logic bombs, back doors can be placed into legitimate code or be standalone programs.<\/p>\n<\/div>\n<div><\/div>\n<div><\/div>\n<div>username = read_username()<br \/>\npassword = read_password()<br \/>\nif tisername i s &#8220;133t h4ck0r&#8221;:<br \/>\nreturn ALLOW^LOGIN<br \/>\nif username and password are valid:<br \/>\nreturn ALLOW_LOGIN<br \/>\ne l s e:<br \/>\nreturn DENY^LOGIN<\/div>\n<div><\/div>\n<div>\n<p>One special kind of back door is a RAT, which stands for Remote Administration Tool or Remote Access Trojan, depending on who&#8217;s asked. These programs allow a computer to be monitored and controlled remotely;<\/p>\n<p><b>Virus<\/b>:<br \/>\nSelf-replicating: yes<br \/>\nPopulation growth: positive<br \/>\nParasitic: yes<\/p>\n<p>A virus is a malware that, when executed, tries to replicate itself into other executable code; when it succeeds, the code is said to be infected. The infected code, when run, can infect new code in turn. This self-replication into existing executable code is the key defining characteristic of a virus.<\/p>\n<\/div>\n<div><i>Types of Virus<\/i><\/div>\n<div><\/div>\n<div>1.Parasitic virus:<br \/>\nTraditional and common virus.\u00a0 This will be attached with EXE files and search for other <span id=\"IL_AD9\" class=\"IL_AD\">EXE file<\/span>\u00a0to infect them.<br \/>\n2. Memory Resident Virus:<br \/>\nPresent in your system memory as a system program.\u00a0 From here onwards it will infects all program that executes.<br \/>\n3. Boot Sector Virus:<br \/>\nInfects the boot record and spread when the system is booted from the disk containing the virus.<br \/>\n4. Stealth Virus:<br \/>\nThis virus hides from the detection of antivirus scanning.<b>Worm:<\/b><\/p>\n<\/div>\n<div><\/div>\n<div class=\"separator\"><a href=\"https:\/\/1.bp.blogspot.com\/-t7JrA8OKJ2M\/U9YU8lY-cwI\/AAAAAAAAAkA\/xH1v2W9GnH0\/s1600\/worm.jpg\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/1.bp.blogspot.com\/-t7JrA8OKJ2M\/U9YU8lY-cwI\/AAAAAAAAAkA\/xH1v2W9GnH0\/s1600\/worm.jpg\" border=\"0\" \/><\/a><\/div>\n<div><b>\u00a0<\/b>\u00a0Self-replicating: yes<br \/>\nPopulation growth: positive<br \/>\nParasitic: no<br \/>\n<b><br \/>\n<\/b>A worm shares several characteristics with a virus. The most important characteristic is that worms are self-replicating too, but the self-replication of a worm is distinct in two ways. First, worms are standalone and do not rely on other<br \/>\nexecutable code. Second, worms spread from machine to machine across networks.<br \/>\n<b><br \/>\n<\/b><b><br \/>\n<\/b><b>Rabbit:<\/b><br \/>\nSelf-replicating: yes<br \/>\nPopulation growth: zero<br \/>\nParasitic: no<br \/>\nRabbit is the term used to describe malware that multiplies rapidly. Rabbits may also be called bacteria, for largely the same reason.There are actually two kinds of a rabbit. The first is a program which tries to consume all of some system resource, like disk space. A &#8220;fork bomb,&#8221; a program which creates new processes in an infinite loop, is a classic example of this kind of rabbit. These tend to leave painfully obvious trails pointing to the perpetrator and are not of particular interest.<\/p>\n<p>The second kind of rabbit, which the characteristics above describe, is a special case of a worm. This kind of rabbit is a standalone program which replicates itself across a network from machine to machine but deletes the original copy of itself after replication. In other words, there is only one copy of a given rabbit on a network; it just hops from one computer to another. Rabbits are rarely seen in practice.<br \/>\n<b><br \/>\n<\/b><b>Spyware:<\/b><\/p>\n<\/div>\n<div class=\"separator\"><a href=\"https:\/\/2.bp.blogspot.com\/-WmsFpCKP8hg\/U9YVLEaco5I\/AAAAAAAAAkI\/mVc4PtmmaJs\/s1600\/spyware.jpg\"><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/2.bp.blogspot.com\/-WmsFpCKP8hg\/U9YVLEaco5I\/AAAAAAAAAkI\/mVc4PtmmaJs\/s1600\/spyware.jpg\" border=\"0\" \/><\/a><\/div>\n<div><b>\u00a0<\/b>Spyware is software which collects information from a computer and transmits to\u00a0someone else.<br \/>\n<b><br \/>\n<\/b>The exact information spyware gathers may vary, but can include anything which\u00a0potentially has value:1 Usernames and passwords. These might be harvested from files on the machine, or by recording what the user types using a\u00a0<span id=\"IL_AD1\" class=\"IL_AD\">key logger<\/span>. A keylogger differs from a Trojan horse in that a keylogger passively captures keystrokes<br \/>\nonly; no active deception is involved.<\/p>\n<p>2 Email addresses, which would have value to a spammer.<\/p>\n<p>3 Bank account and\u00a0<span id=\"IL_AD5\" class=\"IL_AD\">credit card numbers<\/span>.<\/p>\n<p>4 Software license keys, to facilitate software pirating.<br \/>\nDefinitions<br \/>\n<b><br \/>\n<\/b><b>Adware:<\/b><\/p>\n<\/div>\n<div><\/div>\n<div class=\"separator\">\n<figure style=\"width: 130px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/4.bp.blogspot.com\/-A7tZhCt8p2o\/U9YVV9QGIpI\/AAAAAAAAAkQ\/zMRicPNIZBQ\/s1600\/adware.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/4.bp.blogspot.com\/-A7tZhCt8p2o\/U9YVV9QGIpI\/AAAAAAAAAkQ\/zMRicPNIZBQ\/s1600\/adware.jpg\" alt=\"Malicious Softwares\" width=\"130\" height=\"120\" border=\"0\" \/><\/a><figcaption class=\"wp-caption-text\">Malicious Softwares<\/figcaption><\/figure>\n<\/div>\n<div><b>\u00a0<\/b>Self-replicating: no<br \/>\nPopulation growth: zero<br \/>\nParasitic: noAdware has similarities to spyware in that both are gathering information about the user and their habits. Adware is more marketing-focused and may pop up advertisements or redirect a user&#8217;s web browser to certain web sites in the hopes of making a sale. Some adware will\u00a0<span id=\"IL_AD2\" class=\"IL_AD\">attempt<\/span> to target the advertisement to fit the context of what the user is doing. For example, a search for &#8220;Calgary&#8221; may <span id=\"IL_AD3\" class=\"IL_AD\">result in<\/span> an unsolicited pop-up advertisement for &#8220;books about Calgary.&#8221; Adware may also gather and transmit information about users which can be used for marketing purposes. As with spyware, adware does not self-replicate.<br \/>\n<b><br \/>\n<\/b><b>Zombies:<\/b><br \/>\n<b><br \/>\n<\/b>Computers that have been compromised can be used by an attacker for a variety of tasks, unbeknownst to the legitimate owner; computers used in this way are called zombies. The most common tasks for zombies are sending spam and participating in coordinated, large-scale denial-of-service attacks.<\/p>\n<\/div>\n<h3>Signs that your system is Infected by Malware:<\/h3>\n<div id=\"aim25388874586213212561\">\n<ul>\n<li>Slow down, malfunction, or display repeated error messages<\/li>\n<\/ul>\n<ul>\n<li>Won&#8217;t shut down or restart<\/li>\n<\/ul>\n<ul>\n<li>Serve up a lot of pop-up ads, or display them when you&#8217;re not surfing the web<\/li>\n<\/ul>\n<ul>\n<li>Display web pages or programs you didn&#8217;t intend to use, or send emails you didn&#8217;t write.<\/li>\n<li>It can be By pass by <a href=\"http:\/\/zerothcode.com\/blog\/proxy-site-access\/\">Proxy Site<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is Malicious Softwares ? What is the type of Malicious Softwares? \u00a0 Malware is malicious software.\u00a0 This software includes<\/p>\n","protected":false},"author":1,"featured_media":543,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[51],"tags":[159],"yst_prominent_words":[65,63,73,57,64,62,68,71,60,56,69,72,55,59,54,70,61,67,66,58],"class_list":["post-535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials","tag-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=535"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/543"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=535"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}