-+Apun Ka Virus

of 18

  • date post

    09-Apr-2018
  • Category

    Documents

  • view

    219
  • download

    0

Embed Size (px)

Transcript of -+Apun Ka Virus

  • 8/8/2019 -+Apun Ka Virus

    1/18

    Detected by,

    M.Nitin kumar (0701204138)

    Sagar kumar sahu (0701204150)

  • 8/8/2019 -+Apun Ka Virus

    2/18

    A biological virus is not living. Its a fragment of DNA inside a protective jacket.

    Unlike a cell, a virus has no way to do anything or to

    reproduce by itself -- it is not alive. Computer viruses also can not reproduce by

    themselves

    Virus : A true virus is capable of self replication

    on a machine. It may spread between files ordisks, but the defining character is that it canrecreate itself on its own with out traveling toa new host.

  • 8/8/2019 -+Apun Ka Virus

    3/18

    The first virus was made by Farooq alvibrothers of pakistan.

    The virus was named dubbed brain.

    It was a boot sector virus.

    Due to the spreading of use of personalcomputers,virus started spreading from

    different systems.

  • 8/8/2019 -+Apun Ka Virus

    4/18

  • 8/8/2019 -+Apun Ka Virus

    5/18

    A typical virus goes through following stages:

    1. Dormant phase :these remian in dormant statei.e. they get activated by some event.

    2. Propagation phase: The virus places an identicalcopy of itself into other programs or into certainsystem areas on the disk.

    3. Triggering phase: The virus is activated toperform the function for which it was intended

    4. Execution phase: The function may be harmless,such as a message on the screen, or damaging,such as the destruction of programs and data files.

  • 8/8/2019 -+Apun Ka Virus

    6/18

    Parasitic virus: It attaches itself to executable files andreplicates, when the infected program is executed, byfinding other executable files to infect.

    Memory-resident virus: Lodges in main memory aspart of a resident system program.

    Boot sector virus: Infects a master boot record or bootrecord and spreads when a system is booted from thedisk containing the virus.

    Stealth virus:

    Aform of virus explicitly designed tohide itself from detection by antivirus software.

    Polymorphic virus: A virus that mutates with everyinfection, making detection by the signature of thevirus impossible.

  • 8/8/2019 -+Apun Ka Virus

    7/18

    1.Boot virus: The boot virus affects the bootingprocess of the infected computer system thuscausing slow start and shut down process.

    2.DO

    Svirus:

    This virus affects the disk operatingsystem of the infected computer system.

    3. Windows virus:Due to windows virus followingproblems are encountered in the infected computersystem:.

    * Unusual entries in the Task Manager list* Unusual slowdown of system.

    * Increase in file size of infected files

  • 8/8/2019 -+Apun Ka Virus

    8/18

    4.Macro virus: Macro viruses take advantage of afeature found in office application, such asMicrosoft Excel or Microsoft Word. This featureis the macro.

    5.Script virus: These malicious scripts utilizescripting host execution capabilities of browsersand mail systems. These viruses are scripted inthe web scripts.

    6. Java virus: These virus codes are written in javaprogramming language. These have theextension as (*.class).There are two types of javaviruses:

    * JavaA

    pplet* Java Application7. Palm virus: These viruses include the Trojans and

    download from internet to the computer systems.

  • 8/8/2019 -+Apun Ka Virus

    9/18

    A virus runs first when a legitimate program isexecuted. The virus loads itself into memoryand looks to see if it can find any other

    programs on the disk. If it can find one, itmodifies it to add the virus's code to the newprogram. Then the virus launches the "realprogram."The user has no way to know thatthe virus ever ran. Unfortunately, the virus hasnow reproduced itself, so two programs areinfected. The next time either of thoseprograms gets executed, they infect otherprograms, and the cycle continues

  • 8/8/2019 -+Apun Ka Virus

    10/18

    1. Dont open files that you are not expecting

    2. Suspect messages that appear more than oncein your Inbox

    3. Learn file extensions

    4.Anti-virus installation

    Advanced Antivirus Techniques:

    1. Generic Decryption.2. 2. Digital ImmuneSystem.

  • 8/8/2019 -+Apun Ka Virus

    11/18

    Product

    (rated by PC Magazine)

    Editor's

    Rating

    Member's

    Rating

    Norton Anti Virus 2002 5 3McAfee Security Suite No rating No rating

    Trend PC-Cillin 2002 3 4

    Panda Antivirus Platinum 6.0 4 No rating

    Norman Virus Control 5.2 3 No rating

    McAfee Virus Scan 6.0 3 4

    Kaspersky Anti-Virus Personal 3 No rating

    F-Secured Anti-Virus Pesonal Edition 3 No rating

    ETrust EX Armor Suite 3 No rating

  • 8/8/2019 -+Apun Ka Virus

    12/18

    1. [email protected]

    Discovered on: September 18, 2001

    [email protected]

    mm is a new mass-mailing wormthat utilizes email to propagate itself. The threatarrives as readme.exe in an email. It is a virusinfecting both local files and files on remotenetwork shares.

    T

    ype: Worm. Nimda is the first worm to modify existing web

    sites to start offering infected files for download.Also it is the first worm to use normal end usermachines to scan for vulnerable web sites.

  • 8/8/2019 -+Apun Ka Virus

    13/18

    2.Melissa:

    Discovery Date: 3/26/1999

    Origin: Newsgroup Posting

    Length:varies depending on variant

    Type: Macro/Worm

    Subtype: Macro

    Risk Assessment: High

    Category: Companion.

  • 8/8/2019 -+Apun Ka Virus

    14/18

    3.Bubble boy:

    Discovery Date: 11/8/1999

    Origin: Argentina (?)

    Type: Worm/Macro

    Subtype: VbScript

    Risk Assessment: Low

    Category: Stealth/Companion.

  • 8/8/2019 -+Apun Ka Virus

    15/18

    4.Back Orifice:

    Discovery Date: 10/15/1998

    Origin: Pro-hacker Website

    Length:124,928

    Type: Trojan

    Subtype: RemoteAccess

    Risk Assessment: Low

    Category: Stealth.

  • 8/8/2019 -+Apun Ka Virus

    16/18

    RESOURCES:

    1. www.howstuffworks.com/virus.htmhowcomputer viruses work

    2. www.en.weikipedia.org/computervirus

    3. www.symantec.com/avcenter/

  • 8/8/2019 -+Apun Ka Virus

    17/18

  • 8/8/2019 -+Apun Ka Virus

    18/18