Messenger Attack(Problems and Solutions)

Abstract

Abstract For years, people think that the major threat to various companies' computer networks doesn't come from outside hackers,but from internal(often disgruntled) employees. However, a new study disputes that, saying that outside hack attacks are the largest threat. In fact, the outside hackers use the ability of messenger to not only transfer text messages,but also to files transferring. Consequently, messengers can transfer worms and other malicious software( malware).This research includes many practical methods and tricks to attack yahoo messenger by sending executable files that are compressed and masqueraded, that files are responsible for converting Yahoo! Music and other options to malicious web site, and also it is possible to insert messenger into infinite loop, delete messenger after forcing it to close, or convert its path into malicious program path, insuring that done even after restart computer. And also it contains protection methods for that attack which are responsible for disabling system program such as (task manager, system restore, system configuration utility…etc) to ensure that the user couldn't remove the program that caused attack. Finally in this research, software is designed to break that attack by enabling system tools and that will lead to facilitate the task of ending attack. Actually, this software is considered as a solution to widespread problem caused by many malware.