Malware 1
Malware 1
Malware
location in the host program and
overwrites the file with itself at that
location.
4
Attacks Using Malware
• Malware can be classified by the using the primary
trait that the malware possesses:
– Circulation - spreading rapidly to other systems in order to
impact a large number of users
• by using the network to which all the devices are connected,
through USB flash
• drives that are shared among users, or by sending the malware as
an email attachment.
• Malware can be circulated automatically or it may require an action
by the user.
6
Circulation/Infection
• Three types of malware have the primary traits of
circulation and/or infections:
– Viruses
– Worms
– Trojans
10
11
CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 12
Detecting the virus
• Signature-based Detection- Compare the content
of a file to a dictionary of virus
13
Detecting the virus
• Behavior-based Detection- Behavior-based
malware detection evaluates an object based on its
intended actions before it can actually execute that
behavior.
• Some examples include any attempt to discover a
sandbox environment, disabling security controls,
installing rootkits, and registering for autostart.
14
15
CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition 16
Instead, the virus seeks to a random location in the host program and overwrites
the file with itself at that location.
18
CompTIA Security+ Guide to Network Security Fundamentals, Fifth Edition
Viruses
20
Encrypted virus
• Encrypt your payload and use a decryptor at the
beginning of the code. When the code is executed, the
decryptor will decrypt the payload, which will carry out
its malicious mission.
• After that, the decryptor will re-encrypt the payload with
a different key.
21
Encrypted virus
22
Viruses