19
Adware, Spyware, and Adware, Spyware, and Malware Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Embed Size (px)

Citation preview

Page 1: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware, Spyware, and Adware, Spyware, and MalwareMalware

Anand DedhiaBharath Raj

ECE 4112 Project28 April 2005

Page 2: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

OverviewOverview

• Background Info– Adware– Spyware– Malware

• Laboratory Info– Motivation– Procedure

Page 3: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: ExamplesAdware: Examples

Page 4: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: DefinitionAdware: Definition

• Adware is simply an application that displays advertisements while it is running.

• Adware is advertising supported software.

• Adware contains a disclosure statement in the End User License Agreement stating its intentions.

Page 5: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: HazardsAdware: Hazards

• Installs separate advertising components on your system that downloads ads and wastes system resources even after the associated program is removed.

• Some applications connect to ad servers over the Internet and consume network bandwidth while potentially compromising the security of your info.

Page 6: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: SolutionsAdware: Solutions

• Install and run anti-adware tools like Ad-Aware.

Page 7: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

SpywareSpyware

Page 8: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Spyware: DefinitionSpyware: Definition

• Spyware is a generic term describing software whose purpose is to collect demographic and usage information (name, email address, website visits) from your computer, usually for advertising and marketing purposes.

• Spyware gathers the information covertly without the user’s knowledge.

Page 9: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Spyware: HazardsSpyware: Hazards

• Install separate components on your system as well, but records keystrokes and other information which can contain sensitive materials like username & password, credit card numbers, etceteras.

• The spyware uses routines to mail out these logs and activities via email or posting it to a certain page on the web, so attackers can view them at anytime.

Page 10: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Spyware: SolutionsSpyware: Solutions

• Install and run anti-spyware software like Spybot.

Page 11: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: ExamplesMalware: Examples

•Worms/Bugs•Trojans•Viruses

Trojans, 5.68%

Viruses, 9.03%

Worms, 85.29%

Page 12: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: DefinitionMalware: Definition

• Malware, or malicious software, is any software developed for the purpose of doing harm to a computer system.

• Malware is the most dangerous of these programs since it has the potential to destroy one’s computer system.

Page 13: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: HazardsMalware: Hazards

• Worms and viruses can self-replicate and are usually hidden in executable files or parts of applications that can cause extensive damage to a computer system.

• A trojan horse is harmful code disguised as a legitimate program that can cause malfunctions in a system and even allow a stranger to overtake your computer.

Page 14: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: SolutionsMalware: Solutions

• Install and run antivirus software and use a firewall to prevent them from gaining access.

Page 15: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

MotivationMotivation

• Due to the prominence and severity in network security caused by these types of applications, a network administrator should know how to catch and remove these programs before they have the chance of compromising a system’s security.

Page 16: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

What you will do in the labWhat you will do in the lab• Adware

– Program an adware application.• Spyware

– Use Email SpyPro to send duplicate copies of all email to another address.

– Use Etherscout to record and analyze traffic on a network.

• Malware– Show the risks in Malwhere.

• Prevention– Google Toolbar use to prevent the

above.– Spy Doctor

Page 17: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Ethereal ResultsEthereal Results

Page 18: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

18

Source CodeSource CodePrivate myIEDim WSHShellfor i= 0 to 1Set myIE = CreateObject("InternetExplorer.Application")myIE.Navigate "F:\School\ece 4112\popup.html"'myIE.ToolBar = True'myIE.StatusBar = FalsemyIE.AddressBar = TruemyIE.MenuBar = TruemyIE.Resizable = TruemyIE.TheaterMode = False

DoLoop While myIE.BusymyIE.Width = 1024myIE.Height = 740myIE.Left = 0myIE.Top = 0myIE.Visible = TrueSet WSHShell = WScript.CreateObject("WScript.Shell")WshShell.AppActivate("Microsoft Internet Explorer")Set WSHShell = NothingWscript.Sleep(3 * 1000)next

Page 19: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Questions???Questions???