02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

186 Chapter 8 ■ Trojans, Viruses, Worms, and Covert Channels<br />

■<br />

■<br />

■<br />

■<br />

Four short years later, the first PC-compatible virus debuted. The viruses prior to this<br />

point were Apple II types or designed for specific research networks. In 1986, the first<br />

boot-sector viruses debuted, demonstrating a technique later seen on a much wider<br />

scale. This type of virus infected the boot sector of a drive and spread its infection<br />

when the system was going through its boot process.<br />

The first logic bomb debuted in 1987: the Jerusalem virus. This virus was designed to<br />

cause damage only on a certain date: Friday the 13th. The virus was so named because<br />

of its initial discovery in Jerusalem.<br />

Multipartite viruses made their appearance in 1989 in the Ghostball virus. This virus<br />

was designed to cause damage using multiple methods and components, all of which<br />

had to be neutralized and removed to clear out the virus effectively.<br />

Polymorphic viruses first appeared in 1992 as a way to evade early virus-detection<br />

techniques. Polymorphic viruses are designed to change their code and shape to<br />

avoid detection by virus scanners, which look for a specific virus code and not the<br />

new version. Polymorphic viruses employ a series of techniques to change or mutate,<br />

including the following:<br />

■ Polymorphic engine—Alters or mutates the device’s design while keeping intact the<br />

payload (the part that does the damage).<br />

■ Encryption—Used to scramble or hide the damaging payload, keeping antivirus<br />

engines from detecting it.<br />

When deployed, this type of virus mutates every time it is executed and may result in<br />

up to a 90 percent change in code, making it virtually unidentifiable to an antivirus<br />

engine.<br />

■<br />

■<br />

Metamorphic viruses—Completely rewrite themselves on each infection. The<br />

complexity of these viruses is immense, with up to 90 percent of their code dedicated<br />

to the process of changing and rewriting the payload. In essence, this type of virus<br />

possesses the ability to reprogram itself. Through this process, such viruses can avoid<br />

detection by antivirus applications.<br />

Mocmex—Fast-forward to 2008. Mocmex was shipped on digital photo frames<br />

manufactured in China. When the virus infected a system, the system’s firewall and<br />

antivirus software were disabled; then the virus attempted to steal online-game<br />

passwords.<br />

Kinds of Viruses<br />

Modern viruses come in many varieties:<br />

■ A system or boot sector virus is designed to infect and place its own code into the<br />

master boot record (MBR) of a system. Once this infection takes place, the system’s<br />

boot sequence is effectively altered, meaning the virus or other code can be loaded<br />

before the system itself. Post-infection symptoms such as startup problems, problems<br />

with retrieving data, computer performance instability, and the inability to locate hard<br />

drives are all issues that may arise.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!