SlideShare a Scribd company logo
5
Most read
9
Most read
10
Most read
PRESENTED BY:
N.AASHIQ AHAMED
III B.Sc CS(SSS)
SLCS COLLEGE
ZERO DAY! EXPLOIT
• A zero-day vulnerability, also known as a computer
zero day, is a flaw in software, hardware or firmware
that is unknown to the party or parties responsible for
patching or otherwise fixing the flaw.
• Zero day may refer to the vulnerability itself, or it
may refer to a zero-day exploit, an attack that uses the
zero-day vulnerability to attack vulnerable systems.
2017-ZERO DAY! EXPLOIT
WANNACRYATTACK
 The WannaCry ransomware attack was a May
2017 worldwide cyberattack by the
WannaCryransomware cryptoworm, which targeted
computers running the Microsoft Windows operating
system by encrypting data and demanding ransom
payments in the Bitcoincryptocurrency.
 It propagated through EternalBlue,an exploit in older
Windows systems released by The Shadow Brokers a
few months prior to the attack.
HOW DOES ITS WORKS?
• When a computer is infected, the ransomware
typically contacts a central server for the information
it needs to activate, and then begins encrypting files
on the infected computer with that information.
• Once all the files are encrypted, it posts a message
asking for payment to decrypt the files – and
threatens to destroy the information if it doesn’t get
paid, often with a timer attached to ramp up the
pressure.
DEFENCIVE RESPONSE
• Microsoft issued a patch for affected versions
of Windows, ensuring that the vulnerability
couldn’t be used to spread malware between
fully updated versions of its operating system.
• But for many reasons, from lack of resources
to a desire to fully test new updates before
pushing them out more widely, organisations
are often slow to install such security updates
on a wide scale.
SCREEN SHOT OF WANNA CRY
INFECTED SYSTEM
Zero day exploit
MALWARE
WHAT IS MALWARE?
•Malware, or malicious software, is any program or file
that is harmful to a computer user.
•Malware includes computer viruses, worms, Trojan
horses and spyware.
•These malicious programs can perform a variety of
functions, including stealing, encrypting or deleting
sensitive data, altering or hijacking core computing
functions and monitoring users' computer activity
without their permission.
HOW MALWARE WORKS?
• Malware is created by criminals that are very
sophisticated in computer programming before they
install it on the Internet.
•Malware attaches itself to the components of a web
page, pop-up advertisements, toolbars, free stuff that
you download, and games, to name a few.
•When you click on these components, malware sneaks
into your computer.
•Once malware is in your computer it can steal
anything from your music lists to more serious
information like your login passwords, bank account
numbers, and personal information.

More Related Content

PDF
Computer Security
PDF
Ransomware: History, Analysis, & Mitigation - PDF
PPTX
Ethical hacking : Its methodologies and tools
PDF
Ransomware and tips to prevent ransomware attacks
PPTX
WannaCry Ransomware
PPTX
Malware- Types, Detection and Future
PPTX
Footprinting and reconnaissance
PPTX
Denial of Service Attacks (DoS/DDoS)
Computer Security
Ransomware: History, Analysis, & Mitigation - PDF
Ethical hacking : Its methodologies and tools
Ransomware and tips to prevent ransomware attacks
WannaCry Ransomware
Malware- Types, Detection and Future
Footprinting and reconnaissance
Denial of Service Attacks (DoS/DDoS)

What's hot (20)

PPTX
WannaCry ransomware attack
PPTX
Denial of Service Attack
PPTX
PPTX
Ransomware
PPTX
Ransomware
PPT
PPTX
Ransomware
PDF
BOTNET
PPTX
Cybersecurity 2 cyber attacks
PPTX
The Dark Web
PDF
Basics of Zcash Cryptocurrency Protocol
PPTX
MALWARE
PDF
Malware and security
PPTX
Social Engineering new.pptx
PDF
Ch 11: Hacking Wireless Networks
PPTX
Ethical hacking
PPTX
DNS Configuration
PDF
CNIT 123: 6: Enumeration
PDF
Ransomware: Wannacry
PPTX
Cyber attack
WannaCry ransomware attack
Denial of Service Attack
Ransomware
Ransomware
Ransomware
BOTNET
Cybersecurity 2 cyber attacks
The Dark Web
Basics of Zcash Cryptocurrency Protocol
MALWARE
Malware and security
Social Engineering new.pptx
Ch 11: Hacking Wireless Networks
Ethical hacking
DNS Configuration
CNIT 123: 6: Enumeration
Ransomware: Wannacry
Cyber attack
Ad

Similar to Zero day exploit (20)

PPTX
Malware program by mohsin ali dahar khairpur
PPTX
Computer virus
PPT
Malicious
PPTX
Malware ppt final.pptx
PPTX
Virus and its types 2
PPTX
Defend Your Company Against Ransomware
PPTX
What is Ransomware
PPTX
Ransomware Attack.pptx
PPTX
SECURITY THREATS.pptx SECURITY THREATS.pptx
PDF
Get Smart about Ransomware: Protect Yourself and Organization
PPTX
P7 – Identify Potential Security Risks
PPTX
lecture-11-30052022-103626am.pptx
PPTX
Malicious software and software security
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
PPTX
Computer-vIRUS-malicious software and worm.pptx
PPTX
PowerPoint presentation about computer virus
PPT
CyberSecurity presentation for basic knowledge about this topic
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PPT
anti_virus
PPTX
Type of Malware and its different analysis and its types !
Malware program by mohsin ali dahar khairpur
Computer virus
Malicious
Malware ppt final.pptx
Virus and its types 2
Defend Your Company Against Ransomware
What is Ransomware
Ransomware Attack.pptx
SECURITY THREATS.pptx SECURITY THREATS.pptx
Get Smart about Ransomware: Protect Yourself and Organization
P7 – Identify Potential Security Risks
lecture-11-30052022-103626am.pptx
Malicious software and software security
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Computer-vIRUS-malicious software and worm.pptx
PowerPoint presentation about computer virus
CyberSecurity presentation for basic knowledge about this topic
Ransomware : A cyber crime without solution ? by Prashant Mali
anti_virus
Type of Malware and its different analysis and its types !
Ad

More from Aashiq Ahamed N (7)

PPTX
PPTX
Gas leakage detection system
PPT
Usb Drive Protector
PPTX
Components of IOT Implementation
PPTX
Steganography
Gas leakage detection system
Usb Drive Protector
Components of IOT Implementation
Steganography

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology

Zero day exploit

  • 1. PRESENTED BY: N.AASHIQ AHAMED III B.Sc CS(SSS) SLCS COLLEGE
  • 2. ZERO DAY! EXPLOIT • A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw. • Zero day may refer to the vulnerability itself, or it may refer to a zero-day exploit, an attack that uses the zero-day vulnerability to attack vulnerable systems.
  • 4. WANNACRYATTACK  The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCryransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoincryptocurrency.  It propagated through EternalBlue,an exploit in older Windows systems released by The Shadow Brokers a few months prior to the attack.
  • 5. HOW DOES ITS WORKS? • When a computer is infected, the ransomware typically contacts a central server for the information it needs to activate, and then begins encrypting files on the infected computer with that information. • Once all the files are encrypted, it posts a message asking for payment to decrypt the files – and threatens to destroy the information if it doesn’t get paid, often with a timer attached to ramp up the pressure.
  • 6. DEFENCIVE RESPONSE • Microsoft issued a patch for affected versions of Windows, ensuring that the vulnerability couldn’t be used to spread malware between fully updated versions of its operating system. • But for many reasons, from lack of resources to a desire to fully test new updates before pushing them out more widely, organisations are often slow to install such security updates on a wide scale.
  • 7. SCREEN SHOT OF WANNA CRY INFECTED SYSTEM
  • 9. MALWARE WHAT IS MALWARE? •Malware, or malicious software, is any program or file that is harmful to a computer user. •Malware includes computer viruses, worms, Trojan horses and spyware. •These malicious programs can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.
  • 10. HOW MALWARE WORKS? • Malware is created by criminals that are very sophisticated in computer programming before they install it on the Internet. •Malware attaches itself to the components of a web page, pop-up advertisements, toolbars, free stuff that you download, and games, to name a few. •When you click on these components, malware sneaks into your computer. •Once malware is in your computer it can steal anything from your music lists to more serious information like your login passwords, bank account numbers, and personal information.