Professional Documents
Culture Documents
Malware Bsit 3 B
Malware Bsit 3 B
MALWARE
MEMBERS:
BAYBAYANON, JOECALOU 3-B
KIM KARLO SALIMBAGAT 3-B
RAMAN, JOHN PHILIP 3-B
LANGGA, JOHN ERVING 3-B
Republic of the Philippines
Central Philippines State University
San Carlos Campus
Sitio Mabuni, Brgy. Guadalupe, San Carlos City, Negros Occidental
Website: www.cpsu.edu.ph
E-mail add: cpsu_main@cpsu.edu.ph/ cpsu.sancarlos@cpsu.edu.ph
Contact No.: 09173015565 (Mobile); (034) 702-9903 (Landline)
Chapter I
Introduction
In the digital age, cybersecurity is a paramount concern, and at the heart of this
field lies the concept of malware. Malware, a portmanteau of "malicious software,"
refers to any software intentionally designed to cause damage to a computer, server,
client, network, or electronic device. As an ever-evolving threat. In, understanding
malware is critical for both individuals and organizations to safeguard their digital
assets.
Malware has evolved significantly since its inception. Early forms of malware
were primarily created for experimentation or pranks, but with the growth of the
internet and digital reliance, it has developed into a tool for crime, espionage, and
sabotage. Today, malware is a key component of cyber warfare, used by attackers to
steal, destroy, or hold data for ransom.
Chapter II
Methods
Step 2: The next step is to detect the OS type/version of the target host. Based on the
help indicated by NMAP, the parameter of OS type/version detection is variable “-O”.
h
Step 3: Next, open the TCP and UDP ports. To scan all the TCP ports based on
NMAP, use the following command − nmap -p 1-65535 -T4 192.168.1.101 Where the
parameter “–p” indicates all the TCP ports that have to be scanned. In this case, we
are scanning all the ports and “-T4” is the speed of scanning at which NMAP has to
run. Following are the results. In green are all the TCP open ports and in red are all
the closed ports. However, NMAP does not show as the list is too long.
Chapter III
Result
Static Analysis Data: Static analysis involves examining the code and structure
of malware without executing it. Data collected here includes file size, file type,
header information, imports, exports, and strings present in the malware binary.