Malware/Spyware - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Malware/Spyware

Description:

Title: No Slide Title Author: George A. Stewart III Last modified by: Integra Created Date: 2/3/2003 11:42:00 PM Document presentation format: – PowerPoint PPT presentation

Number of Views:391
Avg rating:3.0/5.0
Slides: 17
Provided by: Georg194
Category:
Tags: malware | satan | spyware

less

Transcript and Presenter's Notes

Title: Malware/Spyware


1
Malware/Spyware
  • Group 26
  • Jay Kim and Jimmy Patel

2
Outline
  • Definitions
  • Categories of Spyware
  • Lab material

3
Definitions
  • Malware is a malicious software designed
    specifically to disrupt or harm a computer system
  • Spyware is computer software that gathers and
    reports information about a computer user without
    the user's knowledge or consent

4
Notorious Spyware
  • Gator
  • One of the most annoying
  • Bargain Buddy
  • Finds you bargains, records your profile
  • Various Internet SearchBars
  • Search Bar that records every move

5
How did my computer get infected?
  • Bundled Spyware
  • Often included in Free/Shareware
  • Kazaa, iMesh, and etc
  • Installs more than what it promises
  • Sometimes mentioned in the agreement form

6
How did my computer get infected?
  • Tricky and dishonest Installers

7
How did my computer get infected?
  • You can buy them!
  • Shady companies sell their software with extra
    special features
  • For instance, a Child Monitor program for
    Internet Browsing that also monitors you.

8
Types of Spyware
  • Adware
  • Annoying Pop-up Ads
  • Profiles online surfing and spending habits
  • Tailors Ads based on profile
  • Even when you uninstall the program that
    installed the Adware, the Adware usually sticks
    around

9
Types of Spyware
  • Snoopware
  • Sometimes sold as Child monitor
  • Keeps track of your internet history
  • Keylogger
  • Records keystrokes to obtain password, credit
    card numbers, and sensitive information

10
Some Simple Solutions
  • Firewall
  • Anti-popup Browser feature
  • Paying closer attention
  • Not downloading shady software and being careful
    when downloading

11
Privacy Software
  • Ad-Aware, Spybot Search and Destroy
  • Searches RAM, Windows Registry, external storage
    for known data-mining, tracking, adware, malware
  • Live update tool which downloads the latest
    signatures from their web servers

12
Lab Material
  • Install a Spyware
  • Observe the effects
  • Extra features installed
  • Registry changed
  • Cookie monitoring internet history
  • Ad-Aware
  • Learn the capabilities
  • Undo the damage

13
Lab Material
  • Get your credit card number stolen!

14
Lab Material
  • Keylogging Code
  • Examine a custom keylogger written in C
  • Try to figure out what the code does
  • Learn how keylogging is done in Windows
  • WH_KEYBOARD message Hook

15
Future Addition
  • Monitor the behavior of Spyware on network
  • VC6 project files available for Keylogger
  • Add features for non-evil educational purpose
  • (i.e. Override User Input, Jumble keys)

16
References
  • www.spywareguide.com
  • www.wikipedia.com
  • www.lavasoft.de
  • www.claria.com
  • www.codeguru.com
  • www.amazon.com
Write a Comment
User Comments (0)
About PowerShow.com