Download presentation
Presentation is loading. Please wait.
Published byGiles Rodgers Modified over 9 years ago
1
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel
2
ECE 4883 - Internetwork Security 2 Outline Definitions Categories of Spyware Lab material
3
ECE 4883 - Internetwork Security 3 Definitions Malware is a malicious software designed specifically to disrupt or harm a computer system Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent
4
ECE 4883 - Internetwork Security 4 Notorious Spyware Gator One of the most annoying Bargain Buddy Finds you bargains, records your profile Various Internet SearchBars Search Bar that records every move
5
ECE 4883 - Internetwork Security 5 How did my computer get infected? Bundled Spyware Often included in Free/Shareware Kazaa, iMesh, and etc Installs more than what it promises Sometimes mentioned in the agreement form
6
ECE 4883 - Internetwork Security 6 How did my computer get infected? Tricky and dishonest Installers
7
ECE 4883 - Internetwork Security 7 How did my computer get infected? You can buy them! Shady companies sell their software with extra *special features –For instance, a Child Monitor program for Internet Browsing that also monitors you.
8
ECE 4883 - Internetwork Security 8 Types of Spyware Adware Annoying Pop-up Ads Profiles online surfing and spending habits Tailors Ads based on profile Even when you uninstall the program that installed the Adware, the Adware usually sticks around
9
ECE 4883 - Internetwork Security 9 Types of Spyware Snoopware Sometimes sold as Child monitor Keeps track of your internet history Keylogger Records keystrokes to obtain password, credit card numbers, and sensitive information
10
ECE 4883 - Internetwork Security 10 Some Simple Solutions Firewall Anti-popup Browser feature Paying closer attention Not downloading shady software and being careful when downloading
11
ECE 4883 - Internetwork Security 11 Privacy Software Ad-Aware, Spybot Search and Destroy Searches RAM, Windows Registry, external storage for known data-mining, tracking, adware, malware Live update tool which downloads the latest signatures from their web servers
12
ECE 4883 - Internetwork Security 12 Lab Material Install a Spyware Observe the effects –Extra “features” installed –Registry changed –Cookie monitoring internet history Ad-Aware –Learn the capabilities –Undo the damage
13
ECE 4883 - Internetwork Security 13 Lab Material Get your credit card number stolen!
14
ECE 4883 - Internetwork Security 14 Lab Material Keylogging Code Examine a custom keylogger written in C –Try to figure out what the code does Learn how keylogging is done in Windows –WH_KEYBOARD message Hook
15
ECE 4883 - Internetwork Security 15 Future Addition Monitor the behavior of Spyware on network VC6 project files available for Keylogger Add features for non-evil educational purpose (i.e. Override User Input, Jumble keys)
16
ECE 4883 - Internetwork Security 16 References www.spywareguide.com www.wikipedia.com www.lavasoft.de www.claria.com www.codeguru.com www.amazon.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.