Posts

Showing posts with the label Virus

In-Depth understanding fork() Bomb ~ :(){ :|:& };:

Image
The concept behind a fork bomb — the processes continually replicate themselves, potentially causing a denial of service C an you explain the following bash code or bash fork() bomb? :(){ :|:& };: The fork bomb is a form of denial-of-service (DoS) attack against a Linux based system. It makes use of the fork operation. :(){ :|:& };: is nothing but a bash function. This function get executed recursively. It is often used by sys admin to test user process limitations. Linux process limits can be configured via /etc/security/limits.conf and PAM. Once a successful fork bomb has been activated in a system it may not be possible to resume normal operation without rebooting the system as the only solution to a fork bomb is to destroy all instances of it. WARNING! These examples may crash your computer if executed. Understanding :(){ :|:& };: fork() bomb code :() - Defined the function called : . This function accepts no arguments. The syntax for bash fu...

Wikipedia: If you see ads, You are infected

Image
Wikipedia: If you see ads, You are infected Wikipedia is warning its users that seeing ads on its website usually means your computer is infected with some type of malware. Most of the time, this means a rogue browser add-on or extension. Wikipedia  has issued a warning to its millions of visitors. The headline says it all: “If you’re seeing ads on Wikipedia, your computer is probably infected with malware.” The free encyclopaedia gives three examples of how ads can get onto the site, but only one involves malware. First thing’s first: get yourself a solid antivirus solution like  Microsoft Security Essentials  or  Malwarebytes  and start scanning. If your antivirus solution doesn’t find anything, the second way ads get onto Wikipedia is via browser add-ons and extensions. One example is a Google Chrome extension called “I want this.” To remove it, or any other such extension, open the options menu via the wrench icon on the top right, click on Setti...

Power of Linux

Image
                                 POWER OF LINUX(1)   This part of the  guide shows you how to scan for infected files by booting into SystemRescueCD and running ClamAV , a virus checker. SystemRescueCD constitutes a Swiss army knife of Linux based tools for system recovery. ClamAV is one of the useful tools that it includes in a preconfigured, ready to run state. It is possible to boot from SystemRescueCD, mount a Windows partition and then scan it for virus infected files. As you don't have to boot the infected system, this approach offers some advantages over that of running a Windows-based tool. Boot into the SystemRescueCD desktop in the normal way by accepting the default options and then typing “wizard” when prompted. Once you're at the desktop, open a command line terminal. The first thing to do is to start the ClamVA demon b...

Wi-Fi networks in India vulnerable to DOS

Image
Indian computer security analysts have detected and alerted Wi-Fi  users in the country against a possible virus attack. Indian computer security analysts have detected and alerted Wi-Fi users in the country against a possible virus attack that could lead to crashing and hacking of secure networks. The Indian Computer Emergency Response Team (CERT-In), country's national agency to respond to computer security incidents, has found that the " Wi-Fi Protected Setup (WPS) contains a design error that could allow a weaker-than- expected defence against brute-force attacks, which could allow an attacker to gain unauthorised access to the affected system." A brute-force attack, in computer terminology, is a programme that is used to crack and stealthily enter into an encrypted and password protected system while WPS is a popular method for setting up a new wireless router for a home network. "The virus is streaming in the Indian Internet networks with a high...

Backdoor:Win32/Fynloski.A (Dark Comet): Taxonomy

Image
Backdoor:Win32/Fynloski.A (Dark Comet): Taxonomy     Microsoft has released a detailed taxonomy or detailed summary of Dark Comet RAT. Dark Comet AT is categorized as Backdoor:Win32/Flynloski.A. Read this full story to for detailed information about Microsoft's release. In the quest to compromise users' systems, malware has always employed different and resourceful techniques to achieve its goals. From using social engineering methods, to abusing legitimate software and its features, to using a design familiar to the user, malware has used every dirty trick in the book to achieve its malicious purpose. As a case study for such behavior we'll take a look at Backdoor:Win32/Fynlonski.A and how this malware uses any means necessary to gain access to the compromised system and hide its presence from a security solution. Taxonomy of Backdoor:Win32/Fynlonski.A We have received more than 35,000 samples of Fynloski.A with varying disguises, which we discuss in the following class...