In these lessons:
- The Secrecy Of A Fake Wireless Access Points
- Web Cookie Stealing Attack
- Malicious URL Redirects Hosted File
- Computer File Location
- Waterhole Hacking Attack
- Bait and Switching Attack
For examples:
Included naming the computer file something that would encourage unsuspecting victims to click the file, like "IvanaAlawiNudePics" and using multiple file extensions, such as "IvanaAlawiNudePics.zip.exe" similar to ILOVEYOU virus created by Onel De Guzman, "LOVE-LETTER-FOR-YOU.TXT.vbs" worm virus.
Until this day, Microsoft Windows and other operating systems readily hide file extensions, which will make IvanaAlawiNudePics.gif.exe look alike IvanaAlawiNudePics.gif!
Years ago, malware virus programs known as "twins", "spawners" or "companion viruses" relied on a little-known feature of Disk Operating System (DOS/Microsoft Windows), where even if you typed in the file name Start.exe, Windows would look for and, if found, executeStart.com instead. Companion viruses would look for all the .exe files on your hard drive and create a virus with the same name as the EXE, but with the file extensions .com.
This has long since been fixed by Microsoft since Windows 7 to 8, but its discovery and exploitation by early hackers laid the groundwork for inventive ways to hide viruses that continue to evolve on Windows 10.
Among the more complex record renaming stunts as of now, use is the utilization of Unicode characters that influence the result of the user's file name are introduced.
For example, the Unicode character (U+202E), called the right to left override, can fool many systems into displaying a file actually named IvanaAlawiNudePics.exe as IvanaAlawiNudePics.avi.
Hacking Tips
Whenever possible, make sure you are very familiar of the file extensions, original file name, and file path before executing it.