SlideShare une entreprise Scribd logo
1  sur  30
Ethical Hacking ILKOM 2009 / 2010
Trojan A trojan is a small program that runs hidden on an infected computer. Sebuah program atau code yang tanpa otorisasi yang menempel pada program sah. Program tanpa otorisasi ini melakukan aktivitas yang tidak diketahui dan tidak diinginkan oleh pengguna. Penyerang dapat mengakses sistem yang terkena trojan ketika sistem tersebut melakukan online.
Trojan With the help of a trojan an attacker gets access to stored passwords in the trojaned computer and would be able to read personal documents, delete files, display pictures, and/or show messages on the screen. Transmitting to intruder any files that can be read, installing other program that provide unauthorized network access.
Trojan Trojan jg berusaha utk mengexploit vulnerablility utk meningkatkan level akses dari belakang sistem user yang terkena trojan. Bila ini berhasil maka akan meningkatkan level hak akses. Bila user menggunakan akses level administrator pada OS maka trojan dapat melakukan apa saja sebagaimana yang dpt dilakukan administrator.
Tipe Trojan Remote Access Trojans Password sending Trojans Keylogger Destructive Trojans Denial of service (DoS) attack Trojans Proxy Trojans FTP Trojans Security software disablers
Remote Access Trojans Trojan ini biasanya tertuju pada media dan berakibat otoritas tinggi karena kemampuannya untuk memberikan kepada penyerang kekuatan untuk melakukan hal melebihi kemampuan dari korban itu sndiri. Biasanya kombinasi berbagai trojan. Password sending Trojans Trojan ini mengambil semua cache password dan menangkap pasword yang menuju ke korban dan meng-emailkan ke penyerang tanpa korban sadari.
Keylogger Trojan menyalin tekanan pada keyboard korban dan membiarkan penyerang mencari password atau sensitif mesin di dalam log file. Destructive Trojans Trojan ini khusus untuk menghancurkan atau menghapus file utama sprt .dll, .ini, .exe Denial of service (DoS) attack Trojans Trojan ini digunakan penyerang utk melakukan DoS. Varian trojan ini yaitu mail-bomb trojan yang bertujuan utama menginfeksi sebanyak dan berurutan pada spesifik email/address dengan subjek dan konten acak tanpa bisa difilter.
FTP trojan Trojan ini membuka port 21 dan memberikan siapa saja atau penyerang ke dalam mesin. Proxy Trojans Trojan ini mengubah menjadi sebuah proxy bagi seluruh dunia atau penyerang saja. Trojan ini digunakan untuk anonymous telnet, ICQ, IRC dan sebagainya. Security software disablers Ada sebuah fungsi dari trojan yaitu mendisable security software pada target, sehingga penyerang dapat melakukan explot lebih leluasa untuk keperluan ilegal lainnya.
Pembuat trojan cari Credit card information, e-mail addresses. Accounting data (passwords, user names, etc.) Confidential documents Financial data (bank account numbers, Social Security numbers, insurance information, etc.) Using the victims computer for illegal purposes, such as to hack, scan, flood, or infiltrate other machines on the network or Internet.
Indikasi terserang trojan CD-ROM drawer opens and closes by itself. Computer screen flips upside down or inverts. Wall paper or background settings change by themselves. Documents or messages print from the printer by themselves. Computer browser goes to a strange or unknown web page by itself. Windows color settings change by themselves. Screen saver settings change by themselves.
Indikasi terserang trojan Right and left mouse buttons reverse their Functions Mouse pointer disappears. Mouse moves by itself. Windows Start button disappears. Strange chat boxes appear on the victim’s  computer and the victim is forced to chat with a stranger. The ISP complains to the victim that their computer is IP scanning.
Indikasi terserang trojan Computer shuts down and powers off by itself. Task bar disappears. The account passwords are changed or unauthorized persons can access legitimate accounts. Strange purchase statements in credit card bills. The computer monitor turns itself off and on. Modem dials, and connects, to the Internet by itself. Ctrl + Alt + Del stops working. While rebooting the computer a message flashes that   there are other users still connected.
Trojan launcher PhatBot This Trojan allows the attacker to control computers and link them into P2P networks that can then be used to send large amounts of spam e-mail messages, or flood Web sites with data, in an attempt to knock them offline.  It can steal Windows Product Keys, AOL login names and passwords as well as the CD key of some famous games. It tries to disable antivirus and firewall software. Amitis The Server copies itself to the windows directory so even if the main file is deleted the victim is still infected. The server automatically sends the requested notification as soon as the victim goes online.
Trojan launcher Senna Spy Senna Spy Generator 2.0 is a trojan generator. Senna Spy Generator is able to create Visual Basic source code for a trojan based on the selection of a few options.This trojan is compiled from generated source code, anything could be changed in it. Feature server diantaranya mengubah wallpaper, execute dos command, find filter, FTP server, hang up internet connection, mengambil kunci lisensi. Back orifice Back Orifice (BO) is a remote administration system which allows a user to control a computer across a TCP/IP connection using a simple console or GUI application. On a local LAN or across the internet, BO gives its user more control of the remote Windows machine than the person at the keyboard of the remote machine. Netbus NetBus is a Win32 based Trojan program. Like Back Orifice, NetBus allows a remote user to access and control the victim’s machine by way of its Internet link.
Trojan launcher SubSeven Its symptoms include a slowing down the computer, and a constant stream of error messages. SubSeven is a trojan virus most commonly spread through file attachments in e-mail messages, and the ICQ program. Netcat Outbound or inbound connections, TCP or UDP, to, or from,any port. Ability to use any local source port. Ability to use any locally-configured network source address. Built-in port-scanning capabilities, with randomizer Built-in loose source-routing capability. Subroot Telnet Trojan  It is a telnet remote administration tool. Donald Dick Donald Dick is a tool that enables a user to control another computer over a network. It uses a client-server architecture with the server residing on the victim's computer. The attacker uses the client to send command through TCP or SPX to the victim listening on a pre-defined port.Donald Dick uses default port either 23476 or 23477.
Menghindari trojan Do not download blindly from people, or sites, if it is not 100% safe. Even if the file comes from a friend, be sure what the file is before opening it. Do not use features in  programs that automatically get, or preview, files. Do not blindly type commands when told to type them, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts
Menghindari trojan Do not be lulled into a false sense of security just because an antivirus program is running in the system. Ensure that the corporate perimeter defenses are kept continuously up-to-date. Filter and scan all content that could contain malicious content at the perimeter defenses. Run local versions of antivirus, firewall, and intrusion detection software at the desktop.
Menghindari trojan Rigorously control user permissions within the desktop environment to prevent the installation of malicious applications. Manage local workstation file integrity through checksums, auditing and port scanning. Monitor internal network traffic for unusual open ports or encrypted traffic. Use multiple virus scanners.
Sniffing Sniffer adalah sebuah software yang menangkap data informasi yang vital dari lalu lintas spesifik dalam jaringan tertentu. “data interception” tehcnology. (menangkap/mencegat) The objective of sniffing is to grab: Password (e-mail, web, SMB, ftp, SQL, telnet)  Email text  Files in transfer (e-mail, ftp, SMB)
Sniffing Yang biasa menjadi cara yaitu pada ethernet / jaringan kabel. Dimana proses ethernet protokol bekerja dengan membroadcast paket ke semua host dlm jaringan, dengan header paket yang mengandung MAC address tujuan paket. Dan sniffer memanfaatkan kondisi ini untuk menjadi alamat palsu.
Jenis Sniffing Passive sniffing : menangkap paket yang berjalan di dalam jaringan pada saat dilakukan broadcast. Active sniffing : menangkap paket yang ditujukan ke destination address dan sniffer meracuni ethernet dengan alamat palsu.
Sniffing Sniffer tidak saja digunakan untuk proses penangkapan informasi penting bagi penyusup tetapi digunakan NIDS (network intrusion detection system) untuk menemukan paket-paket asing sehingga dapat memberikan alarm bagi sistem selain itu juga sebagai metrics dan analisis.
Etherflood : memenuhi sebuah ethernet dengan random alamat dan kemudian ethernet mengirimkan informasi pada semua portnya. Sehingga semua jaringan dapat di sniff oleh penyerang dari semua port ethernet tersebut. ARP poisoning : meracuni paket ARP dari NIC penyerang sehingga memaksa NIC korban untuk mengirimkan data kepada penyerang (gateway). Dan jika pemaksaan dilakukan dengan MAC flooding terhadap switch maka akan menjadikan switch bersifat “hub”.
Small Network Use of static IP addresses and static ARP tables which prevent hackers from adding spoofed ARP entries for machines in the network Large Networks Network switch "Port Security" features should be enabled Use of Arpwatch to monitor ethernet activity Mencegah spoof
Ethereal Ethereal is a network protocol analyzer for UNIX and Windows.  It allows the user to examine data from a live network or from a capture file on a disk. The user can interactively browse the captured data, viewing summary and detailed information of each packet captured. Dsniff Dsniff is a collection of tools for network auditing and penetration testing.  ARPSPOOF, DNSSPOOF, and MACOF facilitate the interception of network traffic that is normally unavailable to an attacker.
Sniffit Sniffit is a packet sniffer for TCP/UDP/ICMP packets.  It provides detailed technical information about the packets and packet contents in different formats.  Aldebaran Aldebaran is an advanced LINUX sniffer/network analyzer.  It supports sending data to another host, dump file encryption, real-time mode, packet content scanning.
Ntop Ntop is a network traffic probe that shows network usage. In webmode, it acts as a web server, creating an html dump of the network status.   IPTraf IPTraf is a network monitoring utility for IP networks. It intercepts packets on the network and gives out various pieces of information about the currently monitored IP traffic. monitor the load on an IP network, the types of network services that are most in use.
Network Probe This network monitor and protocol analyzer gives the user an instant picture of the traffic situation on the target network and can be sorted, searched, and filtered by protocols, hosts, conversations, and network interfaces.   Snort Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console.  Packet logger mode logs the packets to the disk. Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set.
ensure that a packet sniffer cannot be installed. The best way to be secured against sniffing is to use encryption.  ARP Spoofing is used to sniff a switched network. So the attacker will try to ARP spoof the gateway. This can be prevented by permanently adding the MAC address of the gateway to the ARP cache. Mencegah sniff
Change the network to SSH. There are various tools to detect a sniffer in a network. They are as follows: ARP Watch Promiscan Antisniff Prodetect Mencegah sniff

Contenu connexe

Tendances (20)

BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Botnets
BotnetsBotnets
Botnets
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
Botnet
BotnetBotnet
Botnet
 
BOTNET
BOTNETBOTNET
BOTNET
 
Software security
Software securitySoftware security
Software security
 
Botnet
BotnetBotnet
Botnet
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Trojan
TrojanTrojan
Trojan
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 
Botnet
Botnet Botnet
Botnet
 
Botnet Architecture
Botnet ArchitectureBotnet Architecture
Botnet Architecture
 

En vedette

Ethical Hacking2
Ethical Hacking2Ethical Hacking2
Ethical Hacking2dodontn
 
Ethical Hacking3
Ethical Hacking3Ethical Hacking3
Ethical Hacking3dodontn
 
夏令营主题介绍New
夏令营主题介绍New夏令营主题介绍New
夏令营主题介绍Newxiaoyumin
 
TRANSICION TERRENO
TRANSICION TERRENOTRANSICION TERRENO
TRANSICION TERRENOguest0ea344
 
Ethical Hacking1
Ethical Hacking1Ethical Hacking1
Ethical Hacking1dodontn
 
TRANSICION TERRENO
TRANSICION TERRENOTRANSICION TERRENO
TRANSICION TERRENOguest0ea344
 
Quadruplicity Presentation
Quadruplicity PresentationQuadruplicity Presentation
Quadruplicity Presentationjhull
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 

En vedette (8)

Ethical Hacking2
Ethical Hacking2Ethical Hacking2
Ethical Hacking2
 
Ethical Hacking3
Ethical Hacking3Ethical Hacking3
Ethical Hacking3
 
夏令营主题介绍New
夏令营主题介绍New夏令营主题介绍New
夏令营主题介绍New
 
TRANSICION TERRENO
TRANSICION TERRENOTRANSICION TERRENO
TRANSICION TERRENO
 
Ethical Hacking1
Ethical Hacking1Ethical Hacking1
Ethical Hacking1
 
TRANSICION TERRENO
TRANSICION TERRENOTRANSICION TERRENO
TRANSICION TERRENO
 
Quadruplicity Presentation
Quadruplicity PresentationQuadruplicity Presentation
Quadruplicity Presentation
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 

Similaire à Ethical Hacking4

Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity AttacksZyrellLalaguna
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalOWASP Delhi
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 

Similaire à Ethical Hacking4 (20)

Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
RAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan BansalRAT - Kill or Get Killed! by Karan Bansal
RAT - Kill or Get Killed! by Karan Bansal
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Information security
Information securityInformation security
Information security
 
TIC
TICTIC
TIC
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Security threats
Security threatsSecurity threats
Security threats
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
MALWARE
MALWAREMALWARE
MALWARE
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 

Dernier

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 

Dernier (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Ethical Hacking4

  • 1. Ethical Hacking ILKOM 2009 / 2010
  • 2. Trojan A trojan is a small program that runs hidden on an infected computer. Sebuah program atau code yang tanpa otorisasi yang menempel pada program sah. Program tanpa otorisasi ini melakukan aktivitas yang tidak diketahui dan tidak diinginkan oleh pengguna. Penyerang dapat mengakses sistem yang terkena trojan ketika sistem tersebut melakukan online.
  • 3. Trojan With the help of a trojan an attacker gets access to stored passwords in the trojaned computer and would be able to read personal documents, delete files, display pictures, and/or show messages on the screen. Transmitting to intruder any files that can be read, installing other program that provide unauthorized network access.
  • 4. Trojan Trojan jg berusaha utk mengexploit vulnerablility utk meningkatkan level akses dari belakang sistem user yang terkena trojan. Bila ini berhasil maka akan meningkatkan level hak akses. Bila user menggunakan akses level administrator pada OS maka trojan dapat melakukan apa saja sebagaimana yang dpt dilakukan administrator.
  • 5. Tipe Trojan Remote Access Trojans Password sending Trojans Keylogger Destructive Trojans Denial of service (DoS) attack Trojans Proxy Trojans FTP Trojans Security software disablers
  • 6. Remote Access Trojans Trojan ini biasanya tertuju pada media dan berakibat otoritas tinggi karena kemampuannya untuk memberikan kepada penyerang kekuatan untuk melakukan hal melebihi kemampuan dari korban itu sndiri. Biasanya kombinasi berbagai trojan. Password sending Trojans Trojan ini mengambil semua cache password dan menangkap pasword yang menuju ke korban dan meng-emailkan ke penyerang tanpa korban sadari.
  • 7. Keylogger Trojan menyalin tekanan pada keyboard korban dan membiarkan penyerang mencari password atau sensitif mesin di dalam log file. Destructive Trojans Trojan ini khusus untuk menghancurkan atau menghapus file utama sprt .dll, .ini, .exe Denial of service (DoS) attack Trojans Trojan ini digunakan penyerang utk melakukan DoS. Varian trojan ini yaitu mail-bomb trojan yang bertujuan utama menginfeksi sebanyak dan berurutan pada spesifik email/address dengan subjek dan konten acak tanpa bisa difilter.
  • 8. FTP trojan Trojan ini membuka port 21 dan memberikan siapa saja atau penyerang ke dalam mesin. Proxy Trojans Trojan ini mengubah menjadi sebuah proxy bagi seluruh dunia atau penyerang saja. Trojan ini digunakan untuk anonymous telnet, ICQ, IRC dan sebagainya. Security software disablers Ada sebuah fungsi dari trojan yaitu mendisable security software pada target, sehingga penyerang dapat melakukan explot lebih leluasa untuk keperluan ilegal lainnya.
  • 9. Pembuat trojan cari Credit card information, e-mail addresses. Accounting data (passwords, user names, etc.) Confidential documents Financial data (bank account numbers, Social Security numbers, insurance information, etc.) Using the victims computer for illegal purposes, such as to hack, scan, flood, or infiltrate other machines on the network or Internet.
  • 10. Indikasi terserang trojan CD-ROM drawer opens and closes by itself. Computer screen flips upside down or inverts. Wall paper or background settings change by themselves. Documents or messages print from the printer by themselves. Computer browser goes to a strange or unknown web page by itself. Windows color settings change by themselves. Screen saver settings change by themselves.
  • 11. Indikasi terserang trojan Right and left mouse buttons reverse their Functions Mouse pointer disappears. Mouse moves by itself. Windows Start button disappears. Strange chat boxes appear on the victim’s computer and the victim is forced to chat with a stranger. The ISP complains to the victim that their computer is IP scanning.
  • 12. Indikasi terserang trojan Computer shuts down and powers off by itself. Task bar disappears. The account passwords are changed or unauthorized persons can access legitimate accounts. Strange purchase statements in credit card bills. The computer monitor turns itself off and on. Modem dials, and connects, to the Internet by itself. Ctrl + Alt + Del stops working. While rebooting the computer a message flashes that there are other users still connected.
  • 13. Trojan launcher PhatBot This Trojan allows the attacker to control computers and link them into P2P networks that can then be used to send large amounts of spam e-mail messages, or flood Web sites with data, in an attempt to knock them offline. It can steal Windows Product Keys, AOL login names and passwords as well as the CD key of some famous games. It tries to disable antivirus and firewall software. Amitis The Server copies itself to the windows directory so even if the main file is deleted the victim is still infected. The server automatically sends the requested notification as soon as the victim goes online.
  • 14. Trojan launcher Senna Spy Senna Spy Generator 2.0 is a trojan generator. Senna Spy Generator is able to create Visual Basic source code for a trojan based on the selection of a few options.This trojan is compiled from generated source code, anything could be changed in it. Feature server diantaranya mengubah wallpaper, execute dos command, find filter, FTP server, hang up internet connection, mengambil kunci lisensi. Back orifice Back Orifice (BO) is a remote administration system which allows a user to control a computer across a TCP/IP connection using a simple console or GUI application. On a local LAN or across the internet, BO gives its user more control of the remote Windows machine than the person at the keyboard of the remote machine. Netbus NetBus is a Win32 based Trojan program. Like Back Orifice, NetBus allows a remote user to access and control the victim’s machine by way of its Internet link.
  • 15. Trojan launcher SubSeven Its symptoms include a slowing down the computer, and a constant stream of error messages. SubSeven is a trojan virus most commonly spread through file attachments in e-mail messages, and the ICQ program. Netcat Outbound or inbound connections, TCP or UDP, to, or from,any port. Ability to use any local source port. Ability to use any locally-configured network source address. Built-in port-scanning capabilities, with randomizer Built-in loose source-routing capability. Subroot Telnet Trojan It is a telnet remote administration tool. Donald Dick Donald Dick is a tool that enables a user to control another computer over a network. It uses a client-server architecture with the server residing on the victim's computer. The attacker uses the client to send command through TCP or SPX to the victim listening on a pre-defined port.Donald Dick uses default port either 23476 or 23477.
  • 16. Menghindari trojan Do not download blindly from people, or sites, if it is not 100% safe. Even if the file comes from a friend, be sure what the file is before opening it. Do not use features in programs that automatically get, or preview, files. Do not blindly type commands when told to type them, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts
  • 17. Menghindari trojan Do not be lulled into a false sense of security just because an antivirus program is running in the system. Ensure that the corporate perimeter defenses are kept continuously up-to-date. Filter and scan all content that could contain malicious content at the perimeter defenses. Run local versions of antivirus, firewall, and intrusion detection software at the desktop.
  • 18. Menghindari trojan Rigorously control user permissions within the desktop environment to prevent the installation of malicious applications. Manage local workstation file integrity through checksums, auditing and port scanning. Monitor internal network traffic for unusual open ports or encrypted traffic. Use multiple virus scanners.
  • 19. Sniffing Sniffer adalah sebuah software yang menangkap data informasi yang vital dari lalu lintas spesifik dalam jaringan tertentu. “data interception” tehcnology. (menangkap/mencegat) The objective of sniffing is to grab: Password (e-mail, web, SMB, ftp, SQL, telnet) Email text Files in transfer (e-mail, ftp, SMB)
  • 20. Sniffing Yang biasa menjadi cara yaitu pada ethernet / jaringan kabel. Dimana proses ethernet protokol bekerja dengan membroadcast paket ke semua host dlm jaringan, dengan header paket yang mengandung MAC address tujuan paket. Dan sniffer memanfaatkan kondisi ini untuk menjadi alamat palsu.
  • 21. Jenis Sniffing Passive sniffing : menangkap paket yang berjalan di dalam jaringan pada saat dilakukan broadcast. Active sniffing : menangkap paket yang ditujukan ke destination address dan sniffer meracuni ethernet dengan alamat palsu.
  • 22. Sniffing Sniffer tidak saja digunakan untuk proses penangkapan informasi penting bagi penyusup tetapi digunakan NIDS (network intrusion detection system) untuk menemukan paket-paket asing sehingga dapat memberikan alarm bagi sistem selain itu juga sebagai metrics dan analisis.
  • 23. Etherflood : memenuhi sebuah ethernet dengan random alamat dan kemudian ethernet mengirimkan informasi pada semua portnya. Sehingga semua jaringan dapat di sniff oleh penyerang dari semua port ethernet tersebut. ARP poisoning : meracuni paket ARP dari NIC penyerang sehingga memaksa NIC korban untuk mengirimkan data kepada penyerang (gateway). Dan jika pemaksaan dilakukan dengan MAC flooding terhadap switch maka akan menjadikan switch bersifat “hub”.
  • 24. Small Network Use of static IP addresses and static ARP tables which prevent hackers from adding spoofed ARP entries for machines in the network Large Networks Network switch "Port Security" features should be enabled Use of Arpwatch to monitor ethernet activity Mencegah spoof
  • 25. Ethereal Ethereal is a network protocol analyzer for UNIX and Windows. It allows the user to examine data from a live network or from a capture file on a disk. The user can interactively browse the captured data, viewing summary and detailed information of each packet captured. Dsniff Dsniff is a collection of tools for network auditing and penetration testing. ARPSPOOF, DNSSPOOF, and MACOF facilitate the interception of network traffic that is normally unavailable to an attacker.
  • 26. Sniffit Sniffit is a packet sniffer for TCP/UDP/ICMP packets. It provides detailed technical information about the packets and packet contents in different formats. Aldebaran Aldebaran is an advanced LINUX sniffer/network analyzer. It supports sending data to another host, dump file encryption, real-time mode, packet content scanning.
  • 27. Ntop Ntop is a network traffic probe that shows network usage. In webmode, it acts as a web server, creating an html dump of the network status. IPTraf IPTraf is a network monitoring utility for IP networks. It intercepts packets on the network and gives out various pieces of information about the currently monitored IP traffic. monitor the load on an IP network, the types of network services that are most in use.
  • 28. Network Probe This network monitor and protocol analyzer gives the user an instant picture of the traffic situation on the target network and can be sorted, searched, and filtered by protocols, hosts, conversations, and network interfaces. Snort Sniffer mode simply reads the packets off of the network and displays them for you in a continuous stream on the console. Packet logger mode logs the packets to the disk. Network intrusion detection mode is the most complex and configurable configuration, allowing Snort to analyze network traffic for matches against a user defined rule set.
  • 29. ensure that a packet sniffer cannot be installed. The best way to be secured against sniffing is to use encryption. ARP Spoofing is used to sniff a switched network. So the attacker will try to ARP spoof the gateway. This can be prevented by permanently adding the MAC address of the gateway to the ARP cache. Mencegah sniff
  • 30. Change the network to SSH. There are various tools to detect a sniffer in a network. They are as follows: ARP Watch Promiscan Antisniff Prodetect Mencegah sniff

Notes de l'éditeur

  1. Lulled : menidurkan/mematikan
  2. Lulled : menidurkan/mematikan
  3. Smb : protokol sharing windows