Ethical Hacking: Course Trojan, Worm & Virus

Learn everything about Trojans, Viruses, and Worms ( Every Ethical Hacker , should know about it )

Ethical Hacking Course Ethical Hacking Course Part 1, Part 2 ,  Part 4 , Part 5 & Part 6.

 Worm, Virus & Trojan Horse

Some of the abilities that hackers have are programming and laptop networking skills. They usually use these skills to achieve access to systems. the target of targeting a corporation would be to steal sensitive information, disrupt business operations or physically injury laptop controlled instrumentality.

 

Topics lined during this half –

  1. What may be a Trojan ?
  2. What is a Worm ?
  3. What is a Virus ?
  4. Trojans, Viruses, and Worms Countermeasures

 

1.What may be a worm ?

A worm is a program that enables the attack to regulate the user’s laptop from a distant location. The program is typically disguised as one thing that’s helpful to the user. Once the user has put in the program, it’s the flexibility to put in malicious payloads, produce backdoors, install alternative unwanted applications that may be wont to compromise the user’s laptop, etc.

 

The list below shows a number of the activities that the offender will perform employing a worm.

  • Use the user’s laptop as a part of the Botnet once playacting distributed denial of service attacks.
  • Damage the user’s laptop (crashing, blue screen of death, etc.)
  • Stealing sensitive information appreciate keep passwords, mastercard info, etc.
  • Modifying files on the user’s computer
  • Electronic cash larceny by playacting unauthorized money transfer transactions
  • Log all the keys that a user presses on the keyboard and causation the information to the offender. This methodology is employed to reap user ids, passwords, and alternative sensitive information.
  • Viewing the users’ screenshot
  • Downloading browsing history data
 

2. What is a worm?

A worm is a malicious trojan horse that replicates itself sometimes over a laptop network. AN offender could use a worm to accomplish the subsequent tasks;

  • Install backdoors on the victim’s computers. The produced backdoor is also wont to create zombie computers that are used to send spam emails, perform distributed denial of service attacks, etc. the backdoors may also be exploited by alternative malware.
  • Worms may retardation the network by overwhelming the information measure as they replicate.
  • Install harmful payload code carried inside the worm.

3.What is a plague ?

  • A virus may be a trojan horse that attaches itself to legitimate programs and files while not the user’s consent. Viruses will consume laptop resources appreciate memory and mainframe time. The attacked programs and files are same to be “infected”. A computer program is also used to;
  • Access non-public information appreciate user id and passwords
  • Display annoying messages to the user
  • Corrupt data in your computer
  • Log the user’s keystrokes

Computer viruses are glorious to use social engineering techniques. These techniques involve deceiving the users to open the files that seem to be traditional files appreciate Word or surpass documents. Once the file is opened, the virus code is dead and will what it’s supposed to try and do.

 

4.Trojans, Viruses, and Worms counter measures –

  • To defend against such attacks, a corporation will use the subsequent strategies.
  • A policy that prohibits users from downloading supernumerary files from the web appreciate spam email attachments, games, programs that claim to hurry up downloads, etc.
  • Anti-virus package should be put in on all user computers. The anti-virus package ought to be updated ofttimes, and scans should be performed at nominative time intervals.
  • Scan secondary storage devices on AN isolated machine particularly those who originate from outside the organization.
  • Regular backups of important information should be created and keep on ideally read-only media appreciate CDs and DVDs.
  • Worms exploit vulnerabilities within the operative systems. Downloading software updates will facilitate cut back the infection and replication of worms.
  • Worms may also be avoided by scanning, all email attachments before downloading them.
 

Trojan, Virus, and Worm Differential Table –

Ethical Hacking: Course Trojan, Worm & Virus

 

 

Hope you wish this post , It’s additionally the most a part of moral Hacking Course to grasp each topics relating to it . Actually , each topic is main in moral Hacking Course .

I make a case for every and each issue regarding Trojan, Virus, and Worms . scan it rigorously , it helps you within the next Up coming back posts . you’ll additionally do comment and asked something from Maine . Next post are going to be discharged shortly .

 

Conclusion

If you guys are enjoying this Ethical Hacking Beginners Course then check out other its other parts, Ethical Hacking Course Part 1 & Part 2

Leave a Comment