Transcript
Page 1: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware, Spyware, and Adware, Spyware, and MalwareMalware

Anand DedhiaBharath Raj

ECE 4112 Project28 April 2005

Page 2: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

OverviewOverview

• Background Info– Adware– Spyware– Malware

• Laboratory Info– Motivation– Procedure

Page 3: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: ExamplesAdware: Examples

Page 4: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: DefinitionAdware: Definition

• Adware is simply an application that displays advertisements while it is running.

• Adware is advertising supported software.

• Adware contains a disclosure statement in the End User License Agreement stating its intentions.

Page 5: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: HazardsAdware: Hazards

• Installs separate advertising components on your system that downloads ads and wastes system resources even after the associated program is removed.

• Some applications connect to ad servers over the Internet and consume network bandwidth while potentially compromising the security of your info.

Page 6: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Adware: SolutionsAdware: Solutions

• Install and run anti-adware tools like Ad-Aware.

Page 7: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

SpywareSpyware

Page 8: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Spyware: DefinitionSpyware: Definition

• Spyware is a generic term describing software whose purpose is to collect demographic and usage information (name, email address, website visits) from your computer, usually for advertising and marketing purposes.

• Spyware gathers the information covertly without the user’s knowledge.

Page 9: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Spyware: HazardsSpyware: Hazards

• Install separate components on your system as well, but records keystrokes and other information which can contain sensitive materials like username & password, credit card numbers, etceteras.

• The spyware uses routines to mail out these logs and activities via email or posting it to a certain page on the web, so attackers can view them at anytime.

Page 10: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Spyware: SolutionsSpyware: Solutions

• Install and run anti-spyware software like Spybot.

Page 11: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: ExamplesMalware: Examples

•Worms/Bugs•Trojans•Viruses

Trojans, 5.68%

Viruses, 9.03%

Worms, 85.29%

Page 12: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: DefinitionMalware: Definition

• Malware, or malicious software, is any software developed for the purpose of doing harm to a computer system.

• Malware is the most dangerous of these programs since it has the potential to destroy one’s computer system.

Page 13: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: HazardsMalware: Hazards

• Worms and viruses can self-replicate and are usually hidden in executable files or parts of applications that can cause extensive damage to a computer system.

• A trojan horse is harmful code disguised as a legitimate program that can cause malfunctions in a system and even allow a stranger to overtake your computer.

Page 14: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Malware: SolutionsMalware: Solutions

• Install and run antivirus software and use a firewall to prevent them from gaining access.

Page 15: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

MotivationMotivation

• Due to the prominence and severity in network security caused by these types of applications, a network administrator should know how to catch and remove these programs before they have the chance of compromising a system’s security.

Page 16: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

What you will do in the labWhat you will do in the lab• Adware

– Program an adware application.• Spyware

– Use Email SpyPro to send duplicate copies of all email to another address.

– Use Etherscout to record and analyze traffic on a network.

• Malware– Show the risks in Malwhere.

• Prevention– Google Toolbar use to prevent the

above.– Spy Doctor

Page 17: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Ethereal ResultsEthereal Results

Page 18: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

18

Source CodeSource CodePrivate myIEDim WSHShellfor i= 0 to 1Set myIE = CreateObject("InternetExplorer.Application")myIE.Navigate "F:\School\ece 4112\popup.html"'myIE.ToolBar = True'myIE.StatusBar = FalsemyIE.AddressBar = TruemyIE.MenuBar = TruemyIE.Resizable = TruemyIE.TheaterMode = False

DoLoop While myIE.BusymyIE.Width = 1024myIE.Height = 740myIE.Left = 0myIE.Top = 0myIE.Visible = TrueSet WSHShell = WScript.CreateObject("WScript.Shell")WshShell.AppActivate("Microsoft Internet Explorer")Set WSHShell = NothingWscript.Sleep(3 * 1000)next

Page 19: Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005

Questions???Questions???


Recommended