Mukezh

Session 10 RANSOMWARES

Nov 29th, 2018
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.87 KB | None | 0 0
  1. 1. RANSOMWARES
  2. ==============
  3. Ransomwares are those Malicious Softwares which encrypts all of the data from your peronal computyer system and ask you for the ransom in term of digital currency. eg . Wannacry, Petya Ransomwares
  4.  
  5. 2. ADWARES
  6. ==========
  7. These are those malicious softwares which acceessed to our machine through globally hosted ads.
  8. Eg. Malwares from Torrents
  9.  
  10. 6. SPYWARES
  11. ===========
  12. Spywares are those deadly Malicious Softwares which are designed to spy on your Machine whether located locally or globally.
  13.  
  14. 6.1 KEYLOGGERS
  15. ===============
  16. Keyloggers are the malicious programs which are used to capture the keystroke of a particular Victim Machine whether stored globally or locally.
  17.  
  18. Eg. Family Key Logger - Spyarsenal
  19.  
  20. Categories
  21. ==========
  22.  
  23. Screenshoter : It takes screenshot on every single keystroke you enter.
  24.  
  25. Screenrecoder : It records in the form of videos.
  26.  
  27. Key Scrambler : It changes the pattern of the keyboard everytime you enter a keystroke.
  28.  
  29. Types of Keyloggers
  30. ===================
  31. 1. LOcal Based Keyloggers : THese are those keyloggers which saves the Keystrokes on the Local Machine of the Victim. You have to access the Victim's Machine to capture the Keystrokes.
  32.  
  33. 2. Server Based Keyloggers : These are those keyloggers which sent keystrokes to a server through internet globally. A attacker can access the keystrokes globally by accessing the Keylogger Server.
  34.  
  35. 7. Botnets
  36. ==========
  37. Botnets = RoBOT+NETworks
  38. Botnets are those malicious smart programs which runs on the network globally and can provide harm to the clients situated to that networks.
  39. Eg. Zeus Botnet etc.
  40.  
  41. 8. Rootkits
  42. ============
  43. These are those Malicious programs which get stored in the Kernal level or Boot sector level of the Operating systems.
  44.  
  45. --------------------------------------------------------------------------------------------------
Add Comment
Please, Sign In to add comment