SlideShare une entreprise Scribd logo
1  sur  29
TROJANS AND BACKDOORS
By Gaurav Dalvi
3rd Year CSE
Reg no:-2011BCS501
MALWARE FAMILY.
Trojans.
 Viruses.
 Worms.
 Rootkits.

BIRTH OF TROJAN


the story of old Greek.(Greek vs. Troy).
The Application works same as the story and is the
most powerful application used for attacking
computers.
 A new game, an electronic mail or a free software
from unknown person can implant Trojan or a
backdoor.
 The first Trojan computer infection is believed to
have appeared in 1986 as a shareware program
called “PC-Write”.

WHAT IS TROJAN?


malicious payload inside a legitimate program.
TYPES OF TROJANS
Destructive Trojan.
 Denial Of Service Trojan.
 Remote Access Trojan.
 Data sending Trojan.
 Proxy Trojan.
 FTP Trojan.
 Security Software Disabler Trojan.

HOW SYSTEMS GET INFECTED BY TROJAN?
Visiting untrusted websites.
 Email Attachments.
 Pirated Software.

TROJAN DETECTION
Manual

With the help of tools

Run key of regedit
ComputerHKey_local_mac
hineSoftwareMicrosoft
WindowsCurrentversion
Run put in it to run
malicious software .





May appear as Malicious
drivers
C:windowsSystem32Driv
ers*.sys


process explorer
 Icesword(port
monitoring) .
 Driverview.
 Srvman.
 Sigverif.
 TrojanHunter.
BACKDOOR CONCEPT
A Backdoor allows a malicious attacker to maintain
privileged access to a compromised host
 Unix back doors are typically installed via a Worm
,Root Kit or manually after a system has been
initially compromised.
 Windows back doors are typically installed via a
Virus, Worm or Trojan Horse.

BACKDOOR INSTALLATION.
Through Trojan.
 Through ActiveX (embedded in website).
 Protection offered by Microsoft.

HIDING MECHANISMS.
Cryptography.
 Rootkits.
 Use different protocols and port numbers.
 Reverse control.
 Backdoor timing.

ROOTKITS

1.

2.

3.

Classical rootkits
Usually attacker
replace the /bin/login
file with the another
version.
He can also save the
password of other
users.
Sometimes Classical
Rootkit hide many
things.


1.
2.

3.

4.

Kernel rootkits
Most powerful rootkit.
It replaces the kernel
of OS.
It can also off
monitoring, antivirus.
It is very hard to
detect.
VIRUSES
WORMS
SPREADING MALWARE .
Fake programs (pop up/rogue security).
 Internet downloads .
 Internet Messenger.
 Email attachments, Links.
 Browser + email software Bugs.
 May contain frame which contain malicious code.
 Physical Access through keyloggers ,spywares.

PROTECTION FROM MALWARE
New Updates.
 Personal Firewall.
 Use non-admin account.
 Use User Access Control.

CASE STUDY.
Back Orifice 2000.(Bo2k)
 Oldest and most powerful backdoor used for
training issues in windows machine.
 It is Open source and is free available on Sorce
forge website.

BACK ORIFICE 2000
It was written by Deldog one of the member of the
„Cult of the dead cow‟ group.
 It was introduce in the DefCon Conference in 1999.
 It was made for good use for monitoring activity but
many people make the malicious use of it.

ABILITIES OF BO2K
BO2K is very small but very complete in abilities.
 Its client code is just 100KB can be easily implanted
on the victims computer.
 It can use different kinds of Hiding technique.
 In recent version it has the reverse client
connection.
 As it is open source you can customize according
to your need.

MAKING A TROJAN USE BO2K
You can use binder application to bind the B02K
client code with other program.
 Elite wrap , Saran Wrap, Silk Rope which are
mostly use to wrap BO2K.

REFERENCES
www.securitytube.net
 CEHv7 courseware.
 www.hackernews.com
 www.insecure.com
 www.securityforge.com
 Defcon Conference.

Trojans and backdoors

Contenu connexe

Tendances

Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile securityPushkar Pashupat
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Network security
Network securityNetwork security
Network securityNandini Raj
 

Tendances (20)

Malware
MalwareMalware
Malware
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network security
Network security Network security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber securityCyber security
Cyber security
 

En vedette

Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoorsjibinmanjooran
 
How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanDavid Wong
 
Java Database Connectivity
Java Database ConnectivityJava Database Connectivity
Java Database Connectivitybackdoor
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Distributed Programming using RMI
 Distributed Programming using RMI Distributed Programming using RMI
Distributed Programming using RMIbackdoor
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tatSensePost
 
Sin título 1
Sin título 1Sin título 1
Sin título 1Fiximun
 
Cómo y por qué abrimos nuestra plataforma
Cómo y por qué abrimos nuestra plataformaCómo y por qué abrimos nuestra plataforma
Cómo y por qué abrimos nuestra plataformaDaniel Rabinovich
 
Malware by Jordan Diaz
Malware by Jordan DiazMalware by Jordan Diaz
Malware by Jordan DiazJordan Diaz
 
ISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFAshley Faciane
 

En vedette (20)

Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-Hellman
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Java Database Connectivity
Java Database ConnectivityJava Database Connectivity
Java Database Connectivity
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Distributed Programming using RMI
 Distributed Programming using RMI Distributed Programming using RMI
Distributed Programming using RMI
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Presentación1
Presentación1Presentación1
Presentación1
 
alberto martin, seguridad
alberto martin, seguridadalberto martin, seguridad
alberto martin, seguridad
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
Cómo y por qué abrimos nuestra plataforma
Cómo y por qué abrimos nuestra plataformaCómo y por qué abrimos nuestra plataforma
Cómo y por qué abrimos nuestra plataforma
 
Malware by Jordan Diaz
Malware by Jordan DiazMalware by Jordan Diaz
Malware by Jordan Diaz
 
Lucas
LucasLucas
Lucas
 
Backdoors PHP y ofuscación
Backdoors PHP y ofuscaciónBackdoors PHP y ofuscación
Backdoors PHP y ofuscación
 
ISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDF
 
File000145
File000145File000145
File000145
 
CRM, Technology and Fitness
CRM, Technology and FitnessCRM, Technology and Fitness
CRM, Technology and Fitness
 

Similaire à Trojans and backdoors

Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYShah Rashedul LastHaque
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 

Similaire à Trojans and backdoors (20)

MALWARE
MALWAREMALWARE
MALWARE
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
virus
virusvirus
virus
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Information security
Information securityInformation security
Information security
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Anti virus
Anti virusAnti virus
Anti virus
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Malware
MalwareMalware
Malware
 

Dernier

TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Dernier (20)

TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 

Trojans and backdoors

  • 1. TROJANS AND BACKDOORS By Gaurav Dalvi 3rd Year CSE Reg no:-2011BCS501
  • 2. MALWARE FAMILY. Trojans.  Viruses.  Worms.  Rootkits. 
  • 3. BIRTH OF TROJAN  the story of old Greek.(Greek vs. Troy).
  • 4. The Application works same as the story and is the most powerful application used for attacking computers.  A new game, an electronic mail or a free software from unknown person can implant Trojan or a backdoor.  The first Trojan computer infection is believed to have appeared in 1986 as a shareware program called “PC-Write”. 
  • 5. WHAT IS TROJAN?  malicious payload inside a legitimate program.
  • 6. TYPES OF TROJANS Destructive Trojan.  Denial Of Service Trojan.  Remote Access Trojan.  Data sending Trojan.  Proxy Trojan.  FTP Trojan.  Security Software Disabler Trojan. 
  • 7. HOW SYSTEMS GET INFECTED BY TROJAN? Visiting untrusted websites.  Email Attachments.  Pirated Software. 
  • 8.
  • 9.
  • 10. TROJAN DETECTION Manual With the help of tools Run key of regedit ComputerHKey_local_mac hineSoftwareMicrosoft WindowsCurrentversion Run put in it to run malicious software .   May appear as Malicious drivers C:windowsSystem32Driv ers*.sys  process explorer  Icesword(port monitoring) .  Driverview.  Srvman.  Sigverif.  TrojanHunter.
  • 11.
  • 12. BACKDOOR CONCEPT A Backdoor allows a malicious attacker to maintain privileged access to a compromised host  Unix back doors are typically installed via a Worm ,Root Kit or manually after a system has been initially compromised.  Windows back doors are typically installed via a Virus, Worm or Trojan Horse. 
  • 13. BACKDOOR INSTALLATION. Through Trojan.  Through ActiveX (embedded in website).  Protection offered by Microsoft. 
  • 14. HIDING MECHANISMS. Cryptography.  Rootkits.  Use different protocols and port numbers.  Reverse control.  Backdoor timing. 
  • 15. ROOTKITS  1. 2. 3. Classical rootkits Usually attacker replace the /bin/login file with the another version. He can also save the password of other users. Sometimes Classical Rootkit hide many things.  1. 2. 3. 4. Kernel rootkits Most powerful rootkit. It replaces the kernel of OS. It can also off monitoring, antivirus. It is very hard to detect.
  • 17.
  • 18.
  • 19. WORMS
  • 20.
  • 21.
  • 22. SPREADING MALWARE . Fake programs (pop up/rogue security).  Internet downloads .  Internet Messenger.  Email attachments, Links.  Browser + email software Bugs.  May contain frame which contain malicious code.  Physical Access through keyloggers ,spywares. 
  • 23. PROTECTION FROM MALWARE New Updates.  Personal Firewall.  Use non-admin account.  Use User Access Control. 
  • 24. CASE STUDY. Back Orifice 2000.(Bo2k)  Oldest and most powerful backdoor used for training issues in windows machine.  It is Open source and is free available on Sorce forge website. 
  • 25. BACK ORIFICE 2000 It was written by Deldog one of the member of the „Cult of the dead cow‟ group.  It was introduce in the DefCon Conference in 1999.  It was made for good use for monitoring activity but many people make the malicious use of it. 
  • 26. ABILITIES OF BO2K BO2K is very small but very complete in abilities.  Its client code is just 100KB can be easily implanted on the victims computer.  It can use different kinds of Hiding technique.  In recent version it has the reverse client connection.  As it is open source you can customize according to your need. 
  • 27. MAKING A TROJAN USE BO2K You can use binder application to bind the B02K client code with other program.  Elite wrap , Saran Wrap, Silk Rope which are mostly use to wrap BO2K. 
  • 28. REFERENCES www.securitytube.net  CEHv7 courseware.  www.hackernews.com  www.insecure.com  www.securityforge.com  Defcon Conference. 

Notes de l'éditeur

  1. It is seemingly useful program containing malware (rogue software)
  2. visiting website can cause to infect the system.click to install npav but installspyware, keyloggerrootkit remote control
  3. PoisonIVY-botnet command control centerbanker Fox-steals banking-Data-often through "Free" Software MP3 file
  4. Classical Rootkits focus on linux based system.Usually attacker replace the /bin/login file with the another version.He can also save the password of other users.Sometimes Classical Rootkit hide many things.(network infromation(netstat,ifconfig),Disk Usage (du,df),Listing of File(ls),Finding of file(find),process status(ps))PROMISC flag in ifconfig file.(sniffing program)KernelRootkitsMost powerful rootkit.It replaces the kernel of OS.It can show network information, file status ,disk usage, port number, process status and other thing.It can also off monitaring ,antivirus.It is very hard to detect.Reverse Control.If there is a private network and victims system is running on the specific i[ address then it becomes difficult for attacker to communicate with the victim’s system.In this situation the backdoor come into picture.Attacker establish a server with the specific ip address and the backdoor can communicate with it inside the firewallEg :- making use of the HTTP protocol the backdoor can request for the commands for the attacker and the attacker can send it in the HTTTP format.Backdoor timing.The attacker can make use of the service which are used for updating the system.In Linux the cron command and in windows the scheduler .He can time the backdoor in such a way at the time when the system administrator in not in the office.
  5. Rootkit:-take control of a systemBuilt in backdoorOften deployed as a torjangood s\w +bad s\w =trojanVery stealthy(silent)-obsure(hide) registry-folder-processesrun under system privileges mod access torjanvery dangerous
  6. Self replicating malware, attached to a files, often to other computers.Lives forever(unless date term exists).spread mostly through human intervention.
  7. WormsSelf replicating malware ,mem-resident,It spread through self replicating Possible resource-intensiveReplicates over network(shares)Often Bot-nets(to create army of bot-net)Distribute itself to everyoneEg:-COnflickerDeny access to administrative accessristrict access to security sitespayload=-actual code which runs on the system after exploitation.