Messenger Attack(Problems and Solutions)
DOI:
https://doi.org/10.31642/JoKMC/2018/010202Keywords:
Messenger AttackAbstract
For years, people think that the major threat to various companies' computer networks doesn't come from outside hackers,but from internal(often disgruntled) employees. However, a new study disputes that, saying that outside hack attacks are the largest threat. In fact, the outside hackers use
the ability of messenger to not only transfer text messages,but also to files transferring. Consequently, messengers can transfer worms and other malicious software ( malware).This research includes many practical methods and tricks to attack yahoo messenger by sending executable files that are compressed and masqueraded, that files are responsible for converting Yahoo! Music
and other options to malicious web site, and also it is possible to insert messenger into infinite loop, delete messenger after forcing it to close, or convert its path into malicious program path, insuring that done even after restart computer. And also it containsmprotection methods for that attack which are responsible for disabling system program such as (task manager, system restore, system configuration utility etc) to ensure that the user couldn't remove the program that caused attack.
Finally in this research, software is designed to break that attack by enabling system tools and that will lead to facilitate the task of ending attack. Actually, this software is considered as a solution to
widespread problem caused by many malware.
Downloads
References
Aaron Faloon, Win32/Sadra.A,
http://www.ca.com/us/securityadvisor/vir
usinfo/virus.aspx?id=77094 , 2009.
Abyss media company, Quick Batch File
Compiler, http://www.abyssmedia.com ,
Ankur Gandhi, How to convert .exe to
.jpg, http:// www. hackingethics. com/
blog/2008/07/22/how-to-convert-exefiles-
to-jpg , 2008.
Amanda Morin, How to write a batch
file, http:// www. ehow. Com /how
_2277553_write-batch-file.html? ref=
fuel&utm_source=yahoo&utm_medium=
ssp&utm_campaign=yssp_art , 2009.
Derrrick J. Farmer , A windows Registry
Quick-Reference for the everyday
Examiner,http://www.forensicfocus.com/
downloads/windows-registry-quickreference.
pdf , 2009.
Fatih Kodak, Bat To Exe Converter 1.5,
http://www.goloads.com/program.php?I
D=56435, 2009.
Gail Allinson, Batch files 101,
http://tips.oncomputers.info/archives2003/03
/2003-may-04.htm , 2003.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Rana Jumaa Surayh Al-janabi
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.