CUSTOMIZABLE NETWORK WORM VIRUS DOWNLOAD INSTALL
Install harmful payload code carried within the worm.Ī virus is a computer program that attaches itself to legitimate programs and files without the user’s consent. Worms may also slowdown the network by consuming the bandwidth as they replicate.
![customizable network worm virus download customizable network worm virus download](https://image.slidesharecdn.com/virusandworms-121125225642-phpapp01/95/virus-and-worms-8-638.jpg)
the backdoors can also be exploited by other malware.
The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks, etc. Install backdoors on the victim’s computers.An attacker may use a worm to accomplish the following tasks This method is used to harvest user ids, passwords, and other sensitive data.Ī worm is a malicious computer program that replicates itself usually over a computer network. Log all the keys that a user presses on the keyboard and sending the data to the attacker.Electronic money theft by performing unauthorized money transfer transactions.Stealing sensitive data such as stored passwords, credit card information, etc.Use the user’s computer as part of the Botnet when performing distributed denial of service attacks.ĭamage the user’s computer (crashing, blue screen of death, etc.) The list below shows some of the activities that the attacker can perform using a Trojan horse. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc. The program is usually disguised as something that is useful to the user. Trojans, viruses, and worms CountermeasuresĪ Trojan horse is a program that allows the attack to control the user’s computer from a remote location.We will also look at the countermeasures that can be used to protect against such activities. In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system.
![customizable network worm virus download customizable network worm virus download](https://images.digitalofficepro.com/mlfpvl/pregnancy-zika-virus-text-powerpoint-template-m.jpg)
Trojans, viruses, and worms can be used to achieve the above-stated objectives. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. They often use these skills to gain access to systems. Some of the skills that hackers have are programming and computer networking skills.