Download presentation
Presentation is loading. Please wait.
Published byLucas Lester Modified over 8 years ago
1
Brandon Resheske
2
What is Malware? Code designed to interfere with normal computer operation The correct general term, instead of ‘virus.’ Basically, executable code that a user would prefer to not have executed
3
Common Malicious Behavior Major Annoyance (General Malware, AKA Ankle Biter) Disguises (Trojan) Stealth Network Security Holes (Worm) Injection Corruption Self-Replication (Virus, Worm) Payload Delivery Efficiency Reverse-Server Concept (Trojan)
4
Demo Show first program
5
Common Disguises/Stealth Windows API Inaccurate Assembly Information Executable Injection Boot-Sector Injection Rootkit
6
Security Holes Found via hacking Exploited by worms
7
Common Injection Methods Executable Cavity Injection Executable Injection System File Injection Boot-Sector Injection File-System Injection Memory Injection
8
Common Self-Replication Methods Windows API Shared Network Email Spamming IM Spamming
9
Demos Cavity Injection Trojan
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.