SlideShare ist ein Scribd-Unternehmen logo
1 von 29
TROJANS AND BACKDOORS
By Gaurav Dalvi
3rd Year CSE
Reg no:-2011BCS501
MALWARE FAMILY.
Trojans.
 Viruses.
 Worms.
 Rootkits.

BIRTH OF TROJAN


the story of old Greek.(Greek vs. Troy).
The Application works same as the story and is the
most powerful application used for attacking
computers.
 A new game, an electronic mail or a free software
from unknown person can implant Trojan or a
backdoor.
 The first Trojan computer infection is believed to
have appeared in 1986 as a shareware program
called “PC-Write”.

WHAT IS TROJAN?


malicious payload inside a legitimate program.
TYPES OF TROJANS
Destructive Trojan.
 Denial Of Service Trojan.
 Remote Access Trojan.
 Data sending Trojan.
 Proxy Trojan.
 FTP Trojan.
 Security Software Disabler Trojan.

HOW SYSTEMS GET INFECTED BY TROJAN?
Visiting untrusted websites.
 Email Attachments.
 Pirated Software.

TROJAN DETECTION
Manual

With the help of tools

Run key of regedit
ComputerHKey_local_mac
hineSoftwareMicrosoft
WindowsCurrentversion
Run put in it to run
malicious software .





May appear as Malicious
drivers
C:windowsSystem32Driv
ers*.sys


process explorer
 Icesword(port
monitoring) .
 Driverview.
 Srvman.
 Sigverif.
 TrojanHunter.
BACKDOOR CONCEPT
A Backdoor allows a malicious attacker to maintain
privileged access to a compromised host
 Unix back doors are typically installed via a Worm
,Root Kit or manually after a system has been
initially compromised.
 Windows back doors are typically installed via a
Virus, Worm or Trojan Horse.

BACKDOOR INSTALLATION.
Through Trojan.
 Through ActiveX (embedded in website).
 Protection offered by Microsoft.

HIDING MECHANISMS.
Cryptography.
 Rootkits.
 Use different protocols and port numbers.
 Reverse control.
 Backdoor timing.

ROOTKITS

1.

2.

3.

Classical rootkits
Usually attacker
replace the /bin/login
file with the another
version.
He can also save the
password of other
users.
Sometimes Classical
Rootkit hide many
things.


1.
2.

3.

4.

Kernel rootkits
Most powerful rootkit.
It replaces the kernel
of OS.
It can also off
monitoring, antivirus.
It is very hard to
detect.
VIRUSES
WORMS
SPREADING MALWARE .
Fake programs (pop up/rogue security).
 Internet downloads .
 Internet Messenger.
 Email attachments, Links.
 Browser + email software Bugs.
 May contain frame which contain malicious code.
 Physical Access through keyloggers ,spywares.

PROTECTION FROM MALWARE
New Updates.
 Personal Firewall.
 Use non-admin account.
 Use User Access Control.

CASE STUDY.
Back Orifice 2000.(Bo2k)
 Oldest and most powerful backdoor used for
training issues in windows machine.
 It is Open source and is free available on Sorce
forge website.

BACK ORIFICE 2000
It was written by Deldog one of the member of the
„Cult of the dead cow‟ group.
 It was introduce in the DefCon Conference in 1999.
 It was made for good use for monitoring activity but
many people make the malicious use of it.

ABILITIES OF BO2K
BO2K is very small but very complete in abilities.
 Its client code is just 100KB can be easily implanted
on the victims computer.
 It can use different kinds of Hiding technique.
 In recent version it has the reverse client
connection.
 As it is open source you can customize according
to your need.

MAKING A TROJAN USE BO2K
You can use binder application to bind the B02K
client code with other program.
 Elite wrap , Saran Wrap, Silk Rope which are
mostly use to wrap BO2K.

REFERENCES
www.securitytube.net
 CEHv7 courseware.
 www.hackernews.com
 www.insecure.com
 www.securityforge.com
 Defcon Conference.

Trojans and backdoors

Weitere ähnliche Inhalte

Was ist angesagt?

Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilitiesebusinessmantra
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpointArifa Ali
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
System hacking
System hackingSystem hacking
System hackingCAS
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 

Was ist angesagt? (20)

Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Spyware
SpywareSpyware
Spyware
 
System security
System securitySystem security
System security
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Malware
MalwareMalware
Malware
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
System hacking
System hackingSystem hacking
System hacking
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security tools
Security toolsSecurity tools
Security tools
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Dmz
Dmz Dmz
Dmz
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 

Andere mochten auch

Andere mochten auch (20)

Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
How to Backdoor Diffie-Hellman
How to Backdoor Diffie-HellmanHow to Backdoor Diffie-Hellman
How to Backdoor Diffie-Hellman
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Java Database Connectivity
Java Database ConnectivityJava Database Connectivity
Java Database Connectivity
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Distributed Programming using RMI
 Distributed Programming using RMI Distributed Programming using RMI
Distributed Programming using RMI
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Rat a-tat-tat
Rat a-tat-tatRat a-tat-tat
Rat a-tat-tat
 
Presentación1
Presentación1Presentación1
Presentación1
 
alberto martin, seguridad
alberto martin, seguridadalberto martin, seguridad
alberto martin, seguridad
 
Sin título 1
Sin título 1Sin título 1
Sin título 1
 
Cómo y por qué abrimos nuestra plataforma
Cómo y por qué abrimos nuestra plataformaCómo y por qué abrimos nuestra plataforma
Cómo y por qué abrimos nuestra plataforma
 
Malware by Jordan Diaz
Malware by Jordan DiazMalware by Jordan Diaz
Malware by Jordan Diaz
 
Lucas
LucasLucas
Lucas
 
Backdoors PHP y ofuscación
Backdoors PHP y ofuscaciónBackdoors PHP y ofuscación
Backdoors PHP y ofuscación
 
ISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDFISSM APP IT1 FACIANE.PDF
ISSM APP IT1 FACIANE.PDF
 
File000145
File000145File000145
File000145
 
CRM, Technology and Fitness
CRM, Technology and FitnessCRM, Technology and Fitness
CRM, Technology and Fitness
 
Malwares
MalwaresMalwares
Malwares
 

Ähnlich wie Trojans and backdoors

Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. AllwoodStavia
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYShah Rashedul LastHaque
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 

Ähnlich wie Trojans and backdoors (20)

MALWARE
MALWAREMALWARE
MALWARE
 
The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
virus
virusvirus
virus
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Information security
Information securityInformation security
Information security
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Anti virus
Anti virusAnti virus
Anti virus
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Malware
MalwareMalware
Malware
 

Kürzlich hochgeladen

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Kürzlich hochgeladen (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Trojans and backdoors

  • 1. TROJANS AND BACKDOORS By Gaurav Dalvi 3rd Year CSE Reg no:-2011BCS501
  • 2. MALWARE FAMILY. Trojans.  Viruses.  Worms.  Rootkits. 
  • 3. BIRTH OF TROJAN  the story of old Greek.(Greek vs. Troy).
  • 4. The Application works same as the story and is the most powerful application used for attacking computers.  A new game, an electronic mail or a free software from unknown person can implant Trojan or a backdoor.  The first Trojan computer infection is believed to have appeared in 1986 as a shareware program called “PC-Write”. 
  • 5. WHAT IS TROJAN?  malicious payload inside a legitimate program.
  • 6. TYPES OF TROJANS Destructive Trojan.  Denial Of Service Trojan.  Remote Access Trojan.  Data sending Trojan.  Proxy Trojan.  FTP Trojan.  Security Software Disabler Trojan. 
  • 7. HOW SYSTEMS GET INFECTED BY TROJAN? Visiting untrusted websites.  Email Attachments.  Pirated Software. 
  • 8.
  • 9.
  • 10. TROJAN DETECTION Manual With the help of tools Run key of regedit ComputerHKey_local_mac hineSoftwareMicrosoft WindowsCurrentversion Run put in it to run malicious software .   May appear as Malicious drivers C:windowsSystem32Driv ers*.sys  process explorer  Icesword(port monitoring) .  Driverview.  Srvman.  Sigverif.  TrojanHunter.
  • 11.
  • 12. BACKDOOR CONCEPT A Backdoor allows a malicious attacker to maintain privileged access to a compromised host  Unix back doors are typically installed via a Worm ,Root Kit or manually after a system has been initially compromised.  Windows back doors are typically installed via a Virus, Worm or Trojan Horse. 
  • 13. BACKDOOR INSTALLATION. Through Trojan.  Through ActiveX (embedded in website).  Protection offered by Microsoft. 
  • 14. HIDING MECHANISMS. Cryptography.  Rootkits.  Use different protocols and port numbers.  Reverse control.  Backdoor timing. 
  • 15. ROOTKITS  1. 2. 3. Classical rootkits Usually attacker replace the /bin/login file with the another version. He can also save the password of other users. Sometimes Classical Rootkit hide many things.  1. 2. 3. 4. Kernel rootkits Most powerful rootkit. It replaces the kernel of OS. It can also off monitoring, antivirus. It is very hard to detect.
  • 17.
  • 18.
  • 19. WORMS
  • 20.
  • 21.
  • 22. SPREADING MALWARE . Fake programs (pop up/rogue security).  Internet downloads .  Internet Messenger.  Email attachments, Links.  Browser + email software Bugs.  May contain frame which contain malicious code.  Physical Access through keyloggers ,spywares. 
  • 23. PROTECTION FROM MALWARE New Updates.  Personal Firewall.  Use non-admin account.  Use User Access Control. 
  • 24. CASE STUDY. Back Orifice 2000.(Bo2k)  Oldest and most powerful backdoor used for training issues in windows machine.  It is Open source and is free available on Sorce forge website. 
  • 25. BACK ORIFICE 2000 It was written by Deldog one of the member of the „Cult of the dead cow‟ group.  It was introduce in the DefCon Conference in 1999.  It was made for good use for monitoring activity but many people make the malicious use of it. 
  • 26. ABILITIES OF BO2K BO2K is very small but very complete in abilities.  Its client code is just 100KB can be easily implanted on the victims computer.  It can use different kinds of Hiding technique.  In recent version it has the reverse client connection.  As it is open source you can customize according to your need. 
  • 27. MAKING A TROJAN USE BO2K You can use binder application to bind the B02K client code with other program.  Elite wrap , Saran Wrap, Silk Rope which are mostly use to wrap BO2K. 
  • 28. REFERENCES www.securitytube.net  CEHv7 courseware.  www.hackernews.com  www.insecure.com  www.securityforge.com  Defcon Conference. 

Hinweis der Redaktion

  1. It is seemingly useful program containing malware (rogue software)
  2. visiting website can cause to infect the system.click to install npav but installspyware, keyloggerrootkit remote control
  3. PoisonIVY-botnet command control centerbanker Fox-steals banking-Data-often through "Free" Software MP3 file
  4. Classical Rootkits focus on linux based system.Usually attacker replace the /bin/login file with the another version.He can also save the password of other users.Sometimes Classical Rootkit hide many things.(network infromation(netstat,ifconfig),Disk Usage (du,df),Listing of File(ls),Finding of file(find),process status(ps))PROMISC flag in ifconfig file.(sniffing program)KernelRootkitsMost powerful rootkit.It replaces the kernel of OS.It can show network information, file status ,disk usage, port number, process status and other thing.It can also off monitaring ,antivirus.It is very hard to detect.Reverse Control.If there is a private network and victims system is running on the specific i[ address then it becomes difficult for attacker to communicate with the victim’s system.In this situation the backdoor come into picture.Attacker establish a server with the specific ip address and the backdoor can communicate with it inside the firewallEg :- making use of the HTTP protocol the backdoor can request for the commands for the attacker and the attacker can send it in the HTTTP format.Backdoor timing.The attacker can make use of the service which are used for updating the system.In Linux the cron command and in windows the scheduler .He can time the backdoor in such a way at the time when the system administrator in not in the office.
  5. Rootkit:-take control of a systemBuilt in backdoorOften deployed as a torjangood s\w +bad s\w =trojanVery stealthy(silent)-obsure(hide) registry-folder-processesrun under system privileges mod access torjanvery dangerous
  6. Self replicating malware, attached to a files, often to other computers.Lives forever(unless date term exists).spread mostly through human intervention.
  7. WormsSelf replicating malware ,mem-resident,It spread through self replicating Possible resource-intensiveReplicates over network(shares)Often Bot-nets(to create army of bot-net)Distribute itself to everyoneEg:-COnflickerDeny access to administrative accessristrict access to security sitespayload=-actual code which runs on the system after exploitation.