Upload
ashish
View
223
Download
2
Embed Size (px)
DESCRIPTION
ppt of ethical
Citation preview
Viruses, Worms, Trojans. Where are we going?
Absurd opinions by: IcE tRe
Past Viruses
Elk ClonerStonedMichelangelo / Media DarlingsGood Times virusElk Cloner
The program with personality.It will get on all your disks. It will infiltrate your chips. Yes its Cloner.It will stick to you like glue. It will modify ram too. Send in the cloner!First virus in the wild.Coded and ran on an Apple ][e.No damaging payload.No real threat.Stoned
Simple boot block virus.Code is the basis of most boot block viruses including the monkey. Which was much more damaging.No real damaging payload.Cute messages displayed upon bootup. Much like Elk Cloner.Michelangelo / Media Darlings
Few infections of actual virus where seen.Media attention actually more damaging then the virus could actually be.Media caused unrealistic expectations of the virus. Only to crash those expectations causing later warnings not to be taken seriously.No actual damage occurred contrary to Press predictions.Result the first and last virus to receive such attention. This could be conceived as both good and bad.Good Times
Recent Viruses
NimdaMy DoomSasserMS BlasterNimda
The GoodMultidistribution virus, uses damn near any method it can get ahold of to try to proliferate, even !fileshares! Fairly inteligent, walks through the filesystem looking for stuff it can use.. Infects websites, changing the index to refer to an infected file, which loads the virus. Website looks the same, but loads the virus.. SMART!!! The BadOnce again! No ambition, it just proliferates. It really doesn't do much of anything other than spread.. I mean seriously what if nimbda had a nasty payload, say something simple but damaging; like destroying the filesystem on the hard drive. Wow, considering how widespread this virus this was, there'd be alot of people with bad hddsMy Doom
The GoodIn my opinion about as good of a virus as blaster.Opens a backdoor, this could be useful! Spreads through Email, KazzaSasser
The GoodSimilar to blaster, used a lsass vuln to overcome the system same conditions really, just need a machine that's on the network andMs Blaster
The GoodRequires nothing other than a vulnerable machine and a network connection.Incredibly prolific, took very little time to spread across the world Opens backdoorMS Blaster
Infected !
Infected !
Infected !
Infected !
Infected !
Infected !
Infected !
Infected !
Infected !
Infected !
Infected !
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
Viruses in the Future
The main problem with todays viruses is simple greed. Attaining to much attention to quickly usually ends up alerting both the users and the mediaThey could really use it to their advantage.In the Future
Scan host A for vulnerability 1.
Scan host B for vulnerability 2
Scan host C for vulnerability 3
`
`
`
`
Scan host A for vulnerability 1.
Scan host C for vulnerability 1
Infected !
Host B has been patched and can not be infected
`
`
`
`
Biblography / Sources
Groups.google.comfsecur.comhttp://securityresponse.symantec.com/`
I
n
f
e
c
t
e
d
P
C
`
I
n
f
e
c
t
e
d
P
C
`
`
`
`
H
o
s
t
B
`
`
H
o
s
t
A
`
H
o
s
t
C