Sunday, May 22, 2022

Project Week 1

 Malware model using python



What is a Malware?
  • Malware is a intrusive software that is used to destroy or damage the computer system or files in the computer.
  • This kind of software uses some encryption keys and use those key to encrypt files in the computer.
  • For retrieving those original contents ,the one who injected the malware can took advantage of us.
  • Some of the common malwares are,
    • Viruses
    • Worms
    • Trojan viruses
    • Spyware
    • Ransomware
    • Adware
  • These can be avoided by using good Anti-virus software and constant network scanning.

What is in this Project?
  • This project can give a idea about how certain malware work.
  • In this project there are three important files are there.
    • encrypter.py
    • decrypter.py
    • thekey.key (This will be created once the encrypter file run.The value changes for every execution of encrypter file )
  • Warnings:
    • Once the encrypter file executed .The files in the particular folder get encrypted with the particular key.
    • If that encryption file is run again,then the already encrypted file will be encrypted again and the previous key will be lost .So that the Original data can't be retrieved.
    • The file name of this three files should not be changed.
    • The encryption file should not be used on the folder with valuable information.
    • This files is applicable to all file formats.
    • Don't ever use this to harm anyone.Doing by mistake can also led to losing of data.
    • Don't directly run this script open the script try to understand the working.Then make fun of it.
    • Have complete idea and play.
  • The file has been uploaded in my github account.
  • The link for the github page is https://github.com/prasad-1808/Malware_using_python.git
Warning: Improper usage can let to losing of file.

How to use the link?
  • Procedure to clone a git file is available here,
  • Installing git file
  • Once the file is downloaded.Move into the directory called Malware_using_python.
  • Read the README file clearly.
  • Go through the code and execute.
  • Please don't blindly execute the code.





    Use Virtual Machine for better protection.

No comments:

Post a Comment

Google Cybersecurity Professional Certificate

    Google Cybersecurity Professional Certification 🔒 Google Cybersecurity Professional Certification: A Journey Unveiled! 🔒 Hey Folks! 🌟...