Malware Propagation ways
Free Software
File Sharing Services
Removable Media
Email Communication
Not using Firewall and Anti-Virus
Trojan Concept
Trojan Infection Process
Trojan Construction Kit
Droppers
Wrappers
Crypter
Deployment of Trojan
Types of Trojans
- Command Shell Trojans
- Defacement Trojans
- HTTP/HTTPS Trojans
- Botnet Trojans
- Proxy Server Trojans
- Remote Access Trojans (RAT)
Trojan Countermeasures
Detection Techniques for Trojans
Virus and Worms Concepts
Viruses
Stages of Virus Life
- Design
- Replication
- Launch
- Detection
- Incorporation
- Elimination
Working of Viruses
- Infection Phase
- Attack Phase
Ransomware
Types of Viruses
- System or Boot Sector Viruses
- File and Multipartite Viruses
- Macro Viruses
- Cluster Viruses
- Stealth/Tunneling Viruses
- Logic Bombs
- Encryption Virus
- Metamorphic Viruses
- File Overwriting or Cavity Viruses
- Sparse Infector Viruses
- Companion/Camouflage Viruses
- Shell Viruses
- File Extension Viruses
- Add-on and Intrusive Viruses
- Transient and Terminate and Stay Resident Viruses
Writing a Simple Virus Program
Virus Generating Tools
Computer Worms
Virus Analysis and Detection Methods
Malware Reverse Engineering
Sheep Dipping
Malware Analysis
Goals of Malware Analysis
Types of Malware Analysis
- Static Analysis
- Dynamic Analysis