Kaplan University
Professor Mathew North, Ph.D.
IT542 – 01: Ethical Hacking and Network Defense
Unit 4 Lab
July 09, 2013
Introduction
The lab consist of using the AVG scan in the virtual machine to detect the different threats that were found which were moved to the virus vault. The window defender was used to verify the different infections and spyware that were found in the virtual machine. Malware and spyware are growing trends in the world of technology. It is good to know the steps to take just in case your system is infected with these nasty malicious malware and spyware.
This is a screenshot of the number of threats that were identified by the scan.
Screen shot of the detailed view of the 1st infection "";"C:\Helix\IR\RAM\win32dd\win32dd.sys";"Trojan horse Hider.JI";"Moved to Virus Vault"
Screen shot of the detailed view of the 2nd infection "";"C:\Helix\IR\nirsoft\LSASecretsView.exe";"May be infected by unknown virus Win32/DH{HhMXFE8VGw}";"Moved to Virus Vault"
Screen shot of the detailed view of the 3rd infection"";"C:\Helix\IR\bin\pwdump2.exe";"May be infected by unknown virus Win32/DH{HhRPFRs}";"Moved to Virus Vault"
Screen shot of the detailed view of the 4th infection "";"C:\Helix\IR\bin\Psh.exe";"Trojan horse Dropper.Generic4.BVMA";"Moved to Virus Vault"
Screen shot of the 1st detailed spyware "";"C:\Helix\IR\nirsoft\astlog.exe";"Potentially harmful program Logger.IAC";"Moved to Virus Vault"
Screen shot of the 2nd detailed spyware "";"C:\Helix\IR\Foundstone\FPipe.exe";"Potentially harmful program Tool.IT";"Moved to Virus Vault"
Screen shot of the 3rd detailed spyware "";"C:\Helix\IR\bin\cryptcat.exe";"Potentially harmful program RemoteAdmin.IH";"Moved to Virus Vault"
This is a screenshot of the Virus Vault.
This is a screenshot of the AVG’s Threat Detected