Fandom

Scratchpad

SSCP Study Notes:Domain 7

215,994pages on
this wiki
Add New Page
Discuss this page0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Template:Malicious Code

Back to SSCP Study Notes

Malicious Code

Malicious Code Types

Functional Virus Types

Viruses are categorized by their functional attributes:

  • Boot sector
  • File
  • Multi-partite
  • Polymorphic
  • Metamorphic
  • Stealth
  • Quasi-virus (Meta-virus)
Boot Sector Viruses
File Viruses
Multi-partite Viruses

Multi-partite

Polymorphic Viruses

Polymorphic viruses attempt to change their memory signature during execution to avoid detection by signature-based anti-virus scanners.

http://en.wikipedia.org/wiki/Polymorphic_virus

Metamorphic Viruses

Metamprphic viruses attmpt to chnage their file signiature as they replicate.

http://en.wikipedia.org/wiki/Metamorphic_code

Stealth Viruses
Quasi-virus (Meta-virus)

The most common form of a quasi-virus is the Macro virus. Quasi-virus programs are also called Meta-viruses, but that is not the correct term to describe something that is "virus-like."


References

Computer Knowledge Virus Tutorial

Timeline of notable computer viruses and worms

List of computer viruses

Macro virus (computing)

Melissa (computer worm)

Code Red (computer worm)

SQL slammer (computer worm)

Morris worm

Nimda (computer worm)

Trojan horse (computing)

Botnet

Zombie computer

Adware

Malware

Spyware

http://en.wikipedia.org/wiki/Anti-virus_software

Mobile Code Threats

Types of Attacks

Infection Vectors

  • Executing infected programs
    • Booting from floppy disk, hard disk, or CD
    • Present in file or program distribution
    • Downloaded from FTP or Web sites or P2P file sharing network
  • Browsing malicious or poisoned Web sites
  • Email
    • Opening (executing) email attachments
    • Displaying HTML email pages
    • Clicking on links referencing malicious or poisoned Web sites
  • Instant messaging
    • Opening (executing) transferred files
    • Clicking on links referencing malicious or poisoned Web sites
  • Open network shares (public and private)
  • Exploitation of various Microsoft IIS 4.0 / 5.0 directory traversal vulnerabilities
  • Back doors opened by worms (Code Red II, sadmind/IIS) and Trojan hourses.
  • Zombie computer (botnet)

Back to SSCP Study Notes

Also on Fandom

Random wikia