International Journal of Modern Communication Technologies & Research (IJMCTR) ISSN: 2321-0850, Volume-2, Issue-9, September 2014 39 www.erpublication.org AbstractSecurity remains at the top concerns of internet usage despite this continuous effort of security engineers to make the Internet as safe as possible, the level of threats continues to grow. Hackers are getting better and quicker every day, while security programming companies do their best to stay the winner of the race. It is an everlasting fight against hacker and intruders who are trying to breach the safety and privacy of their victim whom could be someone using the Internet. In this paper one of the current, dangerous most effective method will be discussed, explaining how what is a payload, how it works, exploits, and the intrusion process, most definitely security precision needs to be taken. Index TermsPayload, Hacking, Internet Security, Victim. I. INTRODUCTION A "payload refers to the Viruses threat level can be calculated by the spread speed, the virus distribution and the caused damage. The damage may include, in addition to spam delivery or offensive message and even raise the level of data destruction, deletion of important files, release confidential information and using powerful virus payload resides in more damage and harm to information system resources. User's account. O be online as an enterprise or a customer means you are not safe and you are always a subject of attack. Many necessary precautions can be made to keep the data as safe as possible, but it is a fact that this can not be guaranteed and there is always a potential no matter how caucus you aware that your data will be hacked. Attacks are evolving very day, and to make thing even more difficult hackers exchange information About systems weakness so rapidly in addition to the sophisticated methods they use, putting security specialist in an everlasting challenge to secure their networks. The attack can be random and can be specific ,on many cases `the victim doesn’t do the necessary protection measures to make the intruders job as hard as possible which could lead to disasters so whether as individual or enterprise there are always primary procedures to prevent being an intrusion victim .A lot of attack nowadays are designed to evade network security , bypassing a firewall , and other intrusion detecting and prevention devises will definitely make the intruder in control of victim resources which could lead to information stealth , distraction or simply denial of service .One of these sophisticated techniques is payload .Payload Manuscript received September 18, 2014. Sana Mahmoud Eltayeb Almansour, El-Neelain University, Faculty of Engineering, Department Of Electronic Engineering, MSc in Communication And Data Networks, Sudan-Khartoum Dr.Amin Babekir Abd elnabi Mustafa, El-Neelain University, Faculty of Engineering, Department Of Electronic Engineering, Sudan-Khartoum. can really bypass security borders , stay in the victim devise or spread in the network without being noticed . II. PAYLOAD:- In order to define payload it is best explained through the definition of vulnerability and exploit. A particular server, website or application is vulnerable when it can be compromised or overtaken by A hacker. Now that we know that a particular application is vulnerable, we need to find an exploit for that vulnerability, which might be the piece of code, to overtake the victim's application without prior authorization. To go further I need a tool, virus or Trojan sent along with the exploit, to be executed on the victims PC which simply the payload. So if a malicious link is sent to the victim, becomes the exploit. But when the victim clicks on it, the shell that executes is nothing but the payload. So the payload refers to the component of a computer virus that executes a malicious activity. Although not all viruses carry a payload, viruses with powerful payload are usually harmful and extremely dangerous. Some of the examples of payloads are data destruction, offensive messages and the delivery of spam emails through the infected user’s account .The payload is written by assembly or a c language and then translated to assembly language throw software but actually The Internet is full of payloads being written by hacker everyday and they have proven their functionality .There are so many ways to execute a payload include: using an unprotected computer (computer without an anti-virus installed) or booting the computer using an infected removable medium , opening an infected file or executing an infected program . III. SEVERITY OF PAYLOAD:- Firewalls proved their ability to protect network from many threats and have been the network first line protection for a long time with their strict security policy, but hackers use deceiving ways to bypass these firewalls and take control of victim recourses. It’s a victim responsibility to make himself a difficult target to be attacked, so if the attack is random generally hacker will loose interest and search more another less protected victims. By scanning a range of IP addresses the hacker chooses a specific victim and begin a port scanning, finding many open ports specially if the victim has a low security protection and if necessary updates is not done in its appropriate time. A hacker may write his own payload or simply use one of hackers groups on the Internet. To bypass the security system payload will be not be sent as a whole, just a very small undetectable and UN suspicious fragment of payload through any executable file And later, these fragments will gather until a program is complete and it will not be checked by firewall whose job to check coming traffic to outgoing One. Effect of Payload Virus as Threatening For Internet Security Sana Mahmoud Eltayeb Almansour, Dr.Amin Babekir Abd elnabi Mustafa