Publication Type : Conference Paper
Publisher : IEEE
Source : 2023 Innovations in Power and Advanced Computing Technologies (i-PACT)
Url : https://doi.org/10.1109/i-pact58649.2023.10434439
Campus : Chennai
School : School of Computing
Department : Computer Science and Engineering
Year : 2023
Abstract :
In the current era of modernization, hackers are constantly improving themselves and discovering easy ways for creating malwares. Hackers generally use malwares to attack their targets and enable multiple forms of cyber-attacks. We propose to create a malicious software using the metasploit framework and analyze its behavior and the risk it poses. To achieve this we use meterpreter, which is an attack payload, that creates an environment for the hacker to explore the target's machine and execute code. The target machine is tested for threat analysis after successfully executing the code. The hacker will now be able to download files, take screenshots, live screen recording, grepping for passwords, escalate privileges, capture keystrokes, connect apps, download apps from the target, encrypt files for demanding ransom, and deny the services requested by the target. The proposed work executes a malware and performs the actions that a hacker can exploit a vulnerable device. This provides an insight of the current status of malware creation and comparing of different types of malwares.
Cite this Research Publication : Gowtham Pushkar Bhatraju, Udhayakumar Shanmugam, B Indira, Uma Nandhini D, Malware Analysis for Proactive Defence on Cyber Threat Vulnerabilities, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2023, https://doi.org/10.1109/i-pact58649.2023.10434439