Académique Documents
Professionnel Documents
Culture Documents
Where are we
going?
Past Viruses
Elk Cloner
Stoned
Michelangelo / Media Darlings
Good Times virus
Elk Cloner
The program with personality.
It will get on all your disks. It will
infiltrate your chips. Yes its Cloner.
It will stick to you like glue. It will modify
ram too. Send in the cloner!
Stoned
Simple boot block virus.
Code is the basis of most boot block
viruses including the monkey. Which
was much more damaging.
No real damaging payload.
Cute messages displayed upon
bootup. Much like Elk Cloner.
Good Times
Recent Viruses
Nimda
My Doom
Sasser
MS Blaster
Nimda
The Good
Multidistribution virus,
uses damn near any
method it can get ahold of
to try to proliferate, even !
fileshares!
Fairly inteligent, walks
through the filesystem
looking for stuff it can
use..
Infects websites, changing
the index to refer to an
infected file, which loads
the virus. Website looks
the same, but loads the
virus.. SMART!!!
The Bad
Once again! No ambition,
it just proliferates. It really
doesn't do much of
anything other than
spread..
I mean seriously what if
nimbda had a nasty
payload, say something
simple but damaging; like
destroying the filesystem
on the hard drive.
Wow, considering how
widespread this virus this
was, there'd be alot of
people with bad hdds
My Doom
The Good
The Bad
In my opinion about as
good of a virus as blaster.
Opens a backdoor, this
could be useful!
Spreads through Email,
Kazza
ddos SCO... Good, they
deserve it!
expiration date: great idea
really.. These things don't
live forever, and
there's a good reason for it.
Why assume as the writer
that it's going to live
forever..
Diversionary tactic! Load
notepad, and show
garbage!
Sasser
The Good
The Bad
Ms Blaster
The Good
The Bad
In
In
In
fe
fe
fe
te
te
te
In
te
te
fe
In
fe
In
fe
te
In
fe
c
te
d
!
In
In
fe
fe
te
te
te
te
fe
fe
In
In
MS Blaster
Sc
fo an
vu r
ho
ln
st
er
A
ab
ili
ty
1.
In the Future
Scan host B
for
vulnerability 2
Sc
fo an
ho
vu r
st
l
3 ne
C
ra
bi
li t
y
Sc
fo an
vu r
ho
ln
st
er
A
ab
ili
ty
1.
d
te
c
fe
!
In
Sc
fo an
ho
vu r
st
l
1 ne
C
ra
bi
li t
y
Biblography / Sources
Groups.google.com
fsecur.com
http://securityresponse.symantec.com/