Messenger Attack(Problems and Solutions)

Authors

  • Rana Jumaa Surayh Al-janabi University of Al-Qadisiyah

DOI:

https://doi.org/10.31642/JoKMC/2018/010202

Keywords:

Messenger Attack

Abstract

For years, people think that the major threat to various companies' computer networks doesn't come from outside hackers,but from internal(often disgruntled) employees. However, a new study disputes that, saying that outside hack attacks are the largest threat. In fact, the outside hackers use
the ability of messenger to not only transfer text messages,but also to files transferring. Consequently, messengers can transfer worms and other malicious software ( malware).This research includes many practical methods and tricks to attack yahoo messenger by sending executable files that are compressed and masqueraded, that files are responsible for converting Yahoo! Music
and other options to malicious web site, and also it is possible to insert messenger into infinite loop, delete messenger after forcing it to close, or convert its path into malicious program path, insuring that done even after restart computer. And also it containsmprotection methods for that attack which are responsible for disabling system program such as (task manager, system restore, system configuration utility etc) to ensure that the user couldn't remove the program that caused attack.
Finally in this research, software is designed to break that attack by enabling system tools and that will lead to facilitate the task of ending attack. Actually, this software is considered as a solution to
widespread problem caused by many malware.

Downloads

Download data is not yet available.

References

Aaron Faloon, Win32/Sadra.A,

http://www.ca.com/us/securityadvisor/vir

usinfo/virus.aspx?id=77094 , 2009.

Abyss media company, Quick Batch File

Compiler, http://www.abyssmedia.com ,

Ankur Gandhi, How to convert .exe to

.jpg, http:// www. hackingethics. com/

blog/2008/07/22/how-to-convert-exefiles-

to-jpg , 2008.

Amanda Morin, How to write a batch

file, http:// www. ehow. Com /how

_2277553_write-batch-file.html? ref=

fuel&utm_source=yahoo&utm_medium=

ssp&utm_campaign=yssp_art , 2009.

Derrrick J. Farmer , A windows Registry

Quick-Reference for the everyday

Examiner,http://www.forensicfocus.com/

downloads/windows-registry-quickreference.

pdf , 2009.

Fatih Kodak, Bat To Exe Converter 1.5,

http://www.goloads.com/program.php?I

D=56435, 2009.

Gail Allinson, Batch files 101,

http://tips.oncomputers.info/archives2003/03

/2003-may-04.htm , 2003.

Downloads

Published

2010-10-30

How to Cite

Al-janabi, R. J. S. (2010). Messenger Attack(Problems and Solutions). Journal of Kufa for Mathematics and Computer, 1(2), 12–22. https://doi.org/10.31642/JoKMC/2018/010202