CCSA#3

System hacking & safeguarding

Disclaimer:

Usage of these information/Data/Tools/Techniques for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. The Computer Joker/Instructor/Owner assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purpose. The Computer Joker/Instructor do not support/promote hacking. For more details, head to our t&c page.

what is a malware?

Malware is short for malicious software, meaning software that can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer.

Malware is a broad term that refers to a variety of malicious programs

types of malware

Virus

Worms

Trojan

Ransomware

Adware

Spyware

Keyloggers & more

virus

A virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs.

Viruses can also spread through script files, documents, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisements, and more.

worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behavior will continue.

Computer worms use recursive method to copy themselves without host program and distribute themselves based on the law of exponential growth, and then controlling and infecting more and more computers in a short time.

Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Trojan

A Trojan horse, commonly known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.

A Trojan can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, keylogging, etc), use the computer in botnets, and anonymize internet activity by the attacker.

ransomware

Ransomware is a form of malware that essentially holds a computer system captive while demanding a ransom.

The malware restricts user access to the computer either by encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the malware creator to remove the restrictions and regain access to their computer.

other malwares

Adware

Serves unwanted advertisements

Spyware

Collects user activity data without their knowledge

Key-loggers

Monitors users' keystrokes 

How to check if the system is affected with malware? 

Run full scan with antivirus/ant-malware software.

Your browser has new extensions you don’t remember installing.

Computer speed goes low.

Your internet connection goes slow.

You are automatically redirected to some websites.

Getting lot of pop-ups.

Compute crashes frequently.

You get unwanted software and shortcuts.

RAM is consumed by a background application that you are not running.

Unable to open files.

Files with unknown extensions created.

How to check if a file is a virus or safe?

Navigate to

www.virustotal.com

and upload the file to check whether it is a virus or safe.

System safeguarding best-practices

Install antivirus and turn on real-time protection

Never open email attachment without scanning them

Watch out your downloads

Update system & apps as soon as you get update

Avoid cracked software

Install firewall or enable them

Block popups

Adjust UAC (User Account Control)

Enable 2FA on social media apps & banking apps.

That's all for this module!

Click below to get to the Next Module - Social Engineering & Security

"Maybe wars aren’t meant to be won, maybe they’re meant to be continuous.”

-ELLIOT<Mr. Robot>

Disclaimer:

Usage of these information/Data/Tools/Techniques for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. The Computer Joker/Instructor/Owner assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purpose. The Computer Joker/owner/Instructor do not support/promote hacking. For more details, head to our t&c page.

want a training?

Please contact us by filling the form on the right side for:

--> Live One to One Training

--> Course materials (pdf, tools & videos)

--> For any queries/feedback & suggestions.

Social

Contact

hi@thecomputerjoker.com

© copyrighted 2021. All Rights Reserved.