Hello, I would like to share with you today the malware concepts , kindly read and appreciate
What is the malware ?
Briefly a Malicious software (malware) is a wide range of different software that has malicious intent. It includes many types of malicious software
Buffer overflow
• A buffer overflow is a programming error that occurs when a program (or system process) attempts to write more data to a fixed length block of memory (buffer) than the buffer is allocated to store.
• The overflow is then written to adjacent memory locations, which can be exploited with malicious code with the intent to cause an application or system crash or to introduce malware to the system.
• Buffer overflow protections include data input validation, Windows run time protections, and secure development practices.
Virus
A virus is a set of malicious code that infects a host.
• It’s executed when typically when an application is executed.
• It will replicate, and when an activation trigger occurs, it will deliver the objective, which is usually malicious.
• Email is the most popular method used to spread viruses.
Types of virus
• Boot Sector Viruses Infects Boot Sector of Hard Drive
• Program Viruses Embedded into a Program
• Script Viruses Web Based Script
• Macro Viruses Microsoft Office Macros
Worms
• Malicious software that travels throughout a network without the assistance of a host application or user interaction.
• Can replicate themselves hundreds of times and spread to all the systems in the network, causing each of these systems to also spread the worm.
• Network performance can slow to a crawl.
• Can travel autonomously over the network.
• A worm does not need a host application and doesn’t require a user to execute it.
Rootkit
• Malware that is designed to gain root (administrative) access on a system by
exploiting known vulnerabilities that enable privilege escalation.
• Modify core system files and be invisible to the operating system so they can
persist without detection:
– Governmental organization spying on another government
–Corporate espionage
–Hacker(s) stealing customer data
Zero days attacks
• Zero day attacks are cyber attacks against software flaws that are unknown and have no patch or fix.
• Occurs on the same day a weakness is discovered and it's exploited before a fix becomes available from its creator.
Hope it helps, thanks


