Skip to main content

Melissa - Nothing but a virus



Melissa refers to a virus, that Written in macro language (visual basic for application languages that use to create MS excel and other word processing software) and disseminates through e-mail attachment. It was the first malicious software which contains the virus, worm, and Trojan as one package and it was found in 1998-1999 span. Melissa has the capability to affect over 1 million computers within 3 days. Once your device is infected by Melissa, receiving emails will be blocked.

The email which carries out the Melissa virus has subject line as “important message from someone” and body text starts with “here is that document you asked for… don’t show anyone else”. The email attachment typically stars as ‘LIST.Doc’. When the recipient opens the email or clicks on the attachment, the software will be immediately activated. Then it sends the same email to the emails addresses which are in the victim’s mail address book. And also it copies itself to documents that are in infected computer storage. Moreover, it propagates by itself like a worm. It will display Simpson cartoon quote “Twenty-two points, plus triple word score, plus fifty points for using all my letters. Game over. I am outta here” when triggered occurred.

Subsequently, undefined error messages, display a blue screen with errors, Interruption in system performance, unexpected removals in files and folders, unexpected termination of a process can be take placed. Since you cannot evade emails, be always cautious about the email you receive, whether the emails have the above characteristics. Besides, delete those suspicious emails and inform the sender too.  


Comments

  1. Very informative . Waiting for future articles😇

    ReplyDelete

Post a Comment

Popular posts from this blog

Cyber Chef - Bake your data!

The cyber chef is a security tool which uses for encoding, decoding, encrypting and data analytics. It is available on GitHub ( https://gchq.github.io/CyberChef/ )  and provides services from simple encoding process to complex encryption process. It was implemented for the British government as a  part of MI5 and MI6 project. However, now it can be used by both technical and non-technical personnel without the knowledge of algorithms. The cyber chef is a freely available web application that can be used online. The offline version is also available to download. The cyber chef has some features to complete conversion tasks. Input –  Where to paste or write text that wanted to convert. Up to 500mb file can be dragged to the input field. Output – Where converted text is displayed. Recipe – where tools used for converting are dragged and dropped. Operations – Contain all the operations. These operations covert input text into selected form and display in output filed.

Change Language in Google Account

When we create an email address, sometimes we do not consider the language preferences. Afterward, when we log in to a google account, context will be shown as unfamiliar. So we can change the language preferences of google account by following steps.  1.  Click on the Google profile and select google account 2.  Select data & personalization settings. 3. Scroll down and go to general preferences for the web. And click language. 4. If you need to change the default language, click on the pen sign. 5. If you want to add more languages, click on add other languages.

Exploit Windows 2000 machine using the Metaspolit framework from the Kali Linux machine.

Exploit Windows 2000 machine using the Metaspolit framework from the Kali Linux machine. When the windows 2000 the machine came for public use, many vulnerabilities were identified. This was caused by the number of vulnerabilities in IIS services. Many attacks came from remote sources through the internet and there were critical flaws due to the vulnerable encryption methods. From this article how the vulnerabilities of windows would be identified using Nessus, and exploit it using Metasploit in kali machine will be described. To do it I am using my main operating system (OS) kali and virtual machine windows 2000. For that IP range of both machines should be in the same range to ensure those are in the same network. Therefore network setting was fix as bridge adaptor in windows virtual machine. Check IP of kali using ifconfig Check IP of windows using ipconfig Then Nessus vulnerability s