Virus, worms, or Trojans can erase your disk, send your credit card numbers and passwords to a stranger, or let others use your computer for illegal purposes like denial of service attacks. Hacker mercenaries view Instant Messaging clients as their personal banks because of the ease by which they can access your computer via the publicly open and interpretable standards. They unleash a Trojan horse, virus, or worm, as well as gather your personal and confidential information. Since you are an expert ethical hacker and penetration tester, the IT director instructs you to test the network for any viruses and worms that can damage or steal the organization’s information. You need to construct viruses and worms, try to inject them in a dummy network (virtual machine), and check their behaviour, whether they are detected by any antivirus programs or bypass the firewall of an organization.
The objective of this lab is to make students learn and understand how to make viruses and worms to test the organization’s firewall and antivirus programs.
In this lab, you have learnt how to make viruses and worms to test the organization’s firewall and antivirus programs.
In this lab, you have learnt how to make viruses and worms to test the organization’s firewall and antivirus programs. Analyze and document the results related to the lab exercise. Give your opinion on your target’s security posture and exposure.