Got it

Understand Malware

Latest reply: Nov 17, 2021 06:28:11 568 11 11 0 0

Hello, I would like to share with you today the malware concepts , kindly read and appreciate


What is the malware ?

Briefly a Malicious software (malware) is a wide range of different software that has malicious intent. It includes many types of malicious software


Buffer overflow

        • A buffer overflow is a programming error that occurs when a program (or system process) attempts to write more data to a fixed length block of memory (buffer) than the buffer is allocated to store.

        • The overflow is then written to adjacent memory locations, which can be exploited with malicious code with the intent to cause an application or system crash or to introduce malware to the system.

        • Buffer overflow protections include data input validation, Windows run time protections, and secure development practices.


Virus 

        A virus is a set of malicious code that infects a host.

        • It’s executed when typically when an application is executed.

        • It will replicate, and when an activation trigger occurs, it will deliver the objective, which is usually malicious.

        • Email is the most popular method used to spread viruses.

                 Types of virus 

        • Boot Sector Viruses Infects Boot Sector of Hard Drive

        • Program Viruses Embedded into a Program

        • Script Viruses Web Based Script

        • Macro Viruses Microsoft Office Macros

        

Worms

        • Malicious software that travels throughout a network without the assistance of a host application or user interaction.

        • Can replicate themselves hundreds of times and spread to all the systems in the network, causing each of these systems to also spread the worm.

        • Network performance can slow to a crawl.

        • Can travel autonomously over the network.

        • A worm does not need a host application and doesn’t require a user to execute it.

        

Rootkit

    • Malware that is designed to gain root (administrative) access on a system by

    exploiting known vulnerabilities that enable privilege escalation.

    • Modify core system files and be invisible to the operating system so they can

    persist without detection:

            – Governmental organization spying on another government

            –Corporate espionage

            –Hacker(s) stealing customer data


Zero days attacks 


• Zero day attacks are cyber attacks against software flaws that are unknown and have no patch or fix.

• Occurs on the same day a weakness is discovered and it's exploited before a fix becomes available from its creator.


Hope it helps, thanks


Vlada85
MVE Author Created May 21, 2021 18:36:07

Good post Understand Malware-3939001-1
View more
  • x
  • convention:

Understood, well done
View more
  • x
  • convention:

andersoncf1
MVE Author Created May 21, 2021 20:41:49

Well done dear friend Understand Malware-3939047-1
View more
  • x
  • convention:

IndianKid
Moderator Author Created May 22, 2021 09:57:27

Good one Dear.
View more
  • x
  • convention:

Thanks friend
View more
  • x
  • convention:

Interesting
View more
  • x
  • convention:

GOOD
View more
  • x
  • convention:

Good sharing
View more
  • x
  • convention:

Good one.
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.