{"id":407,"date":"2026-03-20T04:03:33","date_gmt":"2026-03-20T04:03:33","guid":{"rendered":"https:\/\/quantusintel.group\/osint\/blog\/2026\/03\/20\/ethical-hacking-for-beginners-day-2-viruses-malware-cyber-attacks-security-testing\/"},"modified":"2026-03-20T04:03:33","modified_gmt":"2026-03-20T04:03:33","slug":"ethical-hacking-for-beginners-day-2-viruses-malware-cyber-attacks-security-testing","status":"publish","type":"post","link":"https:\/\/quantusintel.group\/osint\/blog\/2026\/03\/20\/ethical-hacking-for-beginners-day-2-viruses-malware-cyber-attacks-security-testing\/","title":{"rendered":"Ethical Hacking for Beginners \u2014 Day 2: Viruses, Malware, Cyber Attacks &amp; Security Testing"},"content":{"rendered":"<h3>Introduction<\/h3>\n<p>Imagine turning on your computer one day and finding all your files locked, your data stolen, or your system completely unusable.<\/p>\n<p>This is not science fiction\u200a\u2014\u200ait happens every day due to viruses, malware, and cyber attacks. But here\u2019s the good\u00a0news:<\/p>\n<p>If you understand how these attacks work, you can protect yourself and even stop\u00a0them.<\/p>\n<figure><img data-opt-id=771569372  fetchpriority=\"high\" decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1024\/1*Dw6QNF8pPhniOx2WCZE7GQ.png\" \/><figcaption>Defence against attacks (AI generated illustration)<\/figcaption><\/figure>\n<p>In Day 2 of this Ethical Hacking series, we\u2019ll\u00a0explore:<\/p>\n<p>\u2022 <strong>What a virus is<br \/>\u2022 Types of malware<br \/>\u2022 Common cyber attacks<br \/>\u2022 Security testing methods<br \/>\u2022 Cybersecurity teams and how they\u00a0work<\/strong><\/p>\n<p>Let\u2019s dive\u00a0in.<\/p>\n<h3>What is a\u00a0Virus?<\/h3>\n<p>A <strong>computer virus<\/strong> is a type of malicious software (malware) that spreads from one system to another and harms data or system performance.<\/p>\n<p>Just like a biological virus spreads between humans, a computer virus spreads\u00a0through:<\/p>\n<ul>\n<li>Infected files<\/li>\n<li>Email attachments<\/li>\n<li>Downloads from untrusted sources<\/li>\n<li>USB devices<\/li>\n<\/ul>\n<p>Once inside a system, a virus\u00a0can:<\/p>\n<ul>\n<li>Corrupt files<\/li>\n<li>Steal data<\/li>\n<li>Slow down\u00a0systems<\/li>\n<li>Give attackers control over your\u00a0device<\/li>\n<\/ul>\n<figure><img data-opt-id=771569372  fetchpriority=\"high\" decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1024\/1*L9g4tnmLbHSNzKGd_KQt5g.jpeg\" \/><figcaption>Virus (AI generated illustration)<\/figcaption><\/figure>\n<h3>Types of\u00a0Viruses<\/h3>\n<h3>1. File Infector\u00a0Virus<\/h3>\n<p>Attaches itself to files and spreads when the file is\u00a0opened.<\/p>\n<h3>2. Boot Sector\u00a0Virus<\/h3>\n<p>Infects the system startup and runs when the computer turns\u00a0on.<\/p>\n<h3>3. Macro\u00a0Virus<\/h3>\n<p>Spreads through documents like Word or Excel\u00a0files.<\/p>\n<h3>4. Polymorphic Virus<\/h3>\n<p>Changes its code again and again to avoid detection.<\/p>\n<h3>5. Resident\u00a0Virus<\/h3>\n<p>Stays in memory and keeps infecting files over\u00a0time.<\/p>\n<h3>What is\u00a0Malware?<\/h3>\n<p>Malware means <strong>\u201cmalicious software\u201d<\/strong>\u200a\u2014\u200aany software designed to harm, damage, or misuse\u00a0systems.<\/p>\n<blockquote><p><strong>All viruses are malware, but not all malware are\u00a0viruses.<\/strong><\/p><\/blockquote>\n<figure><img data-opt-id=1548930552  decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1024\/0*slEouD_EnR4N3w73.png\" \/><figcaption><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/malware\">Malware (fortinet)<\/a><\/figcaption><\/figure>\n<p>Here are the most common\u00a0types:<\/p>\n<h3>Worm<\/h3>\n<p>Spreads automatically without user action, often through networks.<\/p>\n<h3>Trojan Horse<\/h3>\n<p>Looks like normal software but secretly performs harmful\u00a0actions.<\/p>\n<h3>Ransomware<\/h3>\n<p>Locks your files and asks for money to unlock\u00a0them.<\/p>\n<h3>Spyware<\/h3>\n<p>Secretly collects your personal data (like passwords or activity).<\/p>\n<h3>Adware<\/h3>\n<p>Shows unwanted ads and may track your behavior.<\/p>\n<p>Malware is one of the <strong>main tools attackers use<\/strong> to break into\u00a0systems.<\/p>\n<h3>Common Types of Cyber\u00a0Attacks<\/h3>\n<p>Understanding attacks helps you think like an ethical\u00a0hacker.<\/p>\n<h3>1. Phishing\u00a0Attack<\/h3>\n<p>Fake emails or messages trick users into giving passwords or personal\u00a0data.<\/p>\n<h3>2. DDoS\u00a0Attack<\/h3>\n<p>Attackers send huge traffic to crash a website or\u00a0server.<\/p>\n<h3>3. Man-in-the-Middle (MITM)<\/h3>\n<p>Attacker secretly listens or changes communication between two\u00a0users.<\/p>\n<h3>4. SQL Injection<\/h3>\n<p>Attackers insert malicious code into database queries to access\u00a0data.<\/p>\n<h3>5. Password\u00a0Attack<\/h3>\n<p>Trying to guess or crack passwords using tools or techniques.<\/p>\n<h3>Types of Security\u00a0Testing<\/h3>\n<p>Ethical hackers use testing to <strong>find weaknesses before attackers do<\/strong>.<\/p>\n<h3>1. Black Box\u00a0Testing<\/h3>\n<p>Tester has <strong>no information<\/strong> about the system.<br \/>&#x2714; Acts like a real hacker<br \/>&#x2714; Tests external\u00a0security<\/p>\n<p><strong>Example:<\/strong> Trying to hack a website without knowing its\u00a0code.<\/p>\n<h3>2. White Box\u00a0Testing<\/h3>\n<p>Tester has <strong>full knowledge<\/strong> of the system.<br \/>&#x2714; Access to code, structure, and data<br \/>&#x2714; Finds deep vulnerabilities<\/p>\n<p><strong>Example:<\/strong> Reviewing source code to find security\u00a0flaws.<\/p>\n<h3>3. Grey Box\u00a0Testing<\/h3>\n<p>Tester has <strong>partial knowledge<\/strong>.<br \/>&#x2714; Mix of both black and white box<br \/>&#x2714; More realistic testing<\/p>\n<p><strong>Example:<\/strong> Logged-in user trying to exploit a\u00a0system.<\/p>\n<p>These testing types help organizations <strong>identify and fix security weaknesses effectively<\/strong>.<\/p>\n<figure><img data-opt-id=488234942  decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-images-1.medium.com\/max\/900\/0*iTmyr_sUuUMtW8Ec.jpg\" \/><figcaption><a href=\"https:\/\/www.educba.com\/gray-box-testing\/\">Types of Testing\u00a0(educba)<\/a><\/figcaption><\/figure>\n<h3>Cybersecurity Teams<\/h3>\n<p>Cybersecurity is teamwork. Different teams handle different responsibilities.<\/p>\n<h3>Red Team (Attackers)<\/h3>\n<p>\u2022 Simulate real-world attacks<br \/>\u2022 Try to break into systems<br \/>\u2022 Think like\u00a0hackers<\/p>\n<p><strong>Goal:<\/strong> Find weaknesses<\/p>\n<h3>Blue Team (Defenders)<\/h3>\n<p>\u2022 Monitor systems<br \/>\u2022 Detect and stop attacks<br \/>\u2022 Respond to incidents<\/p>\n<p><strong>Goal:<\/strong> Protect\u00a0systems<\/p>\n<h3>Purple Team (Collaboration)<\/h3>\n<p>\u2022 Combines red and blue teams<br \/>\u2022 Improves communication<br \/>\u2022 Helps fix weaknesses faster<\/p>\n<p><strong>Goal<\/strong>: Improve overall\u00a0security<\/p>\n<ul>\n<li><strong>Red Team \u2192\u00a0Attack<\/strong><\/li>\n<li><strong>Blue Team \u2192\u00a0Defend<\/strong><\/li>\n<li><strong>Purple Team \u2192 Improve\u00a0both<\/strong><\/li>\n<\/ul>\n<figure><img data-opt-id=1921563465  decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-images-1.medium.com\/max\/1007\/0*eS5SomOCnyDi6Ocn.png\" \/><figcaption><a href=\"https:\/\/www.esecurityplanet.com\/networks\/red-team-vs-blue-team-vs-purple-team\/\">Types of Cybersecurity Teams (eSecurityPlanet)<\/a><\/figcaption><\/figure>\n<h3>Conclusion<\/h3>\n<p>Cyber threats are everywhere, but understanding them is the first step to defending against\u00a0them.<\/p>\n<p>In Day 2, you\u00a0learned:<\/p>\n<p>\u2022 What a virus is and how it spreads<br \/>\u2022 What malware is and its types<br \/>\u2022 Common cyber attacks<br \/>\u2022 Different types of security testing<br \/>\u2022 Roles of cybersecurity teams<\/p>\n<p>This knowledge helps you start thinking like an <strong>ethical\u00a0hacker<\/strong>.<\/p>\n<h3>What\u2019s Next?<\/h3>\n<p>In <strong>Day 3<\/strong>, we will\u00a0explore:<\/p>\n<p><strong>Linux for Ethical Hackers (Commands, Setup &amp; Practice)<\/strong><\/p>\n<p>Stay tuned and keep learning&#x1f680;<\/p>\n<p><strong>Like, subscribe and share if You love\u00a0content<\/strong><\/p>\n<p><img data-opt-id=574357117  decoding=\"async\" src=\"https:\/\/medium.com\/_\/stat?event=post.clientViewed&amp;referrerSource=full_rss&amp;postId=3371f3d5ec32\" width=\"1\" height=\"1\" alt=\"\" \/><\/p>\n<hr \/>\n<p><a href=\"https:\/\/osintteam.blog\/ethical-hacking-for-beginners-day-2-viruses-malware-cyber-attacks-security-testing-3371f3d5ec32\">Ethical Hacking for Beginners \u2014 Day 2: Viruses, Malware, Cyber Attacks &amp; Security Testing<\/a> was originally published in <a href=\"https:\/\/osintteam.blog\/\">OSINT Team<\/a> on Medium, where people are continuing the conversation by highlighting and responding to this story.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction Imagine turning on your computer one day and finding all your files locked, your data stolen, or your system completely unusable. This is not science fiction\u200a\u2014\u200ait happens every day due to viruses, malware, and cyber attacks. But here\u2019s the good\u00a0news: If you understand how these attacks work, you can protect yourself and even stop\u00a0them. &#8230; <a title=\"Ethical Hacking for Beginners \u2014 Day 2: Viruses, Malware, Cyber Attacks &amp; Security Testing\" class=\"read-more\" href=\"https:\/\/quantusintel.group\/osint\/blog\/2026\/03\/20\/ethical-hacking-for-beginners-day-2-viruses-malware-cyber-attacks-security-testing\/\" aria-label=\"Read more about Ethical Hacking for Beginners \u2014 Day 2: Viruses, Malware, Cyber Attacks &amp; Security Testing\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-407","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/posts\/407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/comments?post=407"}],"version-history":[{"count":0,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/posts\/407\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/media\/408"}],"wp:attachment":[{"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/media?parent=407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/categories?post=407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quantusintel.group\/osint\/wp-json\/wp\/v2\/tags?post=407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}