Understanding Malware: Types, Risks, and Removal Methods

Slide Note
Embed
Share

Explore the world of malware, including its various types and how it infiltrates systems. Discover the dangers it poses, such as data theft and system hijacking, and learn about manual removal techniques using tools like MBAM. Dive into hands-on labs to analyze, detect, and eliminate malware for a safer computing experience.


Uploaded on Oct 03, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. LAB 6 DEFEATING MALWARE NET 332

  2. COVERAGE Manual Removal of Malware using MBAM Overview of how malware steals user information and location

  3. WHAT IS MALWARE Malware, or malicious software, is any program or file that is harmful to a computer user. These malicious programs can perform functions such as: Data stealing, Encrypting or deleting sensitive data Altering or hijacking core computing functions Monitoring users' computer activity without their permission. Communicating the same to their servers.

  4. TYPES OF MALWARE Malware are designed for different purposes Adware Scanners Trojans Redirects Decryptors Encryptors Root kits Spyware Backdoors Etc.,

  5. HOW MALWARE WORKS Get installed through download or access of malicious sites or free downloads Flash update, Adobe Update, etc., Freeware download Free online virus scanning Once installed, start propagating and infecting files.

  6. WHERE CAN I FIND MALWARE FOR TESTING Vxvalut.net Malc0de.com Clean-mx.de

  7. HANDS ON MALWARE (SCAN & TERMINATE) For this lab, we will use the previously configured windows virtual machine in the oracle virtual box. Download the zipped folder Malware from the Vdrive folder for Lab 6. Download and install the MBAM from the Vdrive folder for Lab 6. Disable the MBAM and windows defender and firewall. Run the task manager and notice the normal processes of the windows image Unzip the malware folder and double click on the malware files inside, to install them on the virtual machine

  8. HANDS ON MALWARE (2) Once the malware files are run, open the task manager: Ctrl + Alt + Delete and select task manager Right click the task bar and click on the task manager. Notice and note down the additional processes you see in the task manager. Also notice the resources they consume The resources are not used for processing Hijacking to slow down the infected computer.

  9. HANDS ON MALWARE (3) Getting rid of the malware Enable the MBAM from the task manager and run a full scan of the computer. The MBAM should return with infections found message Delete the infections by clicking on Remove Files Restart the virtual image Access the task manger again and check for processes previously noted (malware processes)

  10. WHERE DO MALWARE STORE THE DATA Malware come in different types such as scanners and spyware. Scan the user profile and computer for data and communicate the same to the provocateur servers Before the data is communicated, it is saved in a temporary location cookies It s a good practice to clean up/delete cookies often as possible. Accessing and reading cookies can be of great help in dealing with malware proactively. Requires appropriate skill set and knowledge

  11. ACCESSING & READING COOKIES In Chrome GotoSettings Select Advance Settings:

  12. ACCESSING & READING COOKIES (2) Under Privacy Settings Select Content Settings Select Cookies under content settings

  13. ACCESSING & READING COOKIES (3) Select See All Cookies in Site Data

  14. ACCESSING & READING COOKIES (4) Select any cookie to see its details Cookie details are listed

  15. Questions ?

More Related Content