Backdoor

15
Trojan and Backdoor Teams Group - Nguyễn Mạnh Cường - Nguyễn Hoàng Hoàn - Cao Văn Tân - Nguyễn Trung Tín Giáo viên hướng dẫn: - Phạm Văn Tính

description

Quan Tri Mang

Transcript of Backdoor

Page 1: Backdoor

Trojan and Backdoor

Teams Group

- Nguyễn Mạnh Cường

- Nguyễn Hoàng Hoàn

- Cao Văn Tân

- Nguyễn Trung Tín

Giáo viên hướng dẫn:

- Phạm Văn Tính

Page 2: Backdoor
Page 3: Backdoor

Introduction• - What ‘s Trojan ?: It’s a program runs hidden on an

infected computer• - What’s A backdoor ?:It is any type of program that will

allow a hacker to connect to a computer without going through the normal authentication process

• - What’s is used ?: allow a hacker remote access to your system, start a keystroke logger to record your every keystroke, plant a backdoor on your system, cause a DoS, or even disable your antivirus protection or software firewall.

Page 4: Backdoor

Trojan Types

Page 5: Backdoor

Trojan Infection Mechanisms

Page 6: Backdoor

Distributing Trojans

• - Wrapper: A wrapper is a program used to combine two or more executables into a single packaged program.

Page 7: Backdoor

Change icon, defacing application

Page 8: Backdoor

Infecting via CD-ROM, USB

• An Autorun.inf file

[autorun]

open=setup.exe

icon=setup.exe

• Turn off the Auto-Start functionality by doing the following:

Start button-> Settings-> Control Panel-> System-> Device Manager-> CDROM-> Properties -> Settings

Page 9: Backdoor

Hacking Tool

• Firekiller 2000 : will kill (if executed) any resistant protection software.

• ICMP Tunneling

• Reverse WWW Shell

ICMP Tunneling

Page 10: Backdoor

Backdoor, Trojan Countermeasures

• Most commercial ant-virus products can

automatically scan and detect backdoor

programs before they can cause damage (Eg.

before accessing a floppy, running exe or

downloading mail)

• Educate your users not to install applications

downloaded from the internet and e-mail

attachments.

Page 11: Backdoor

Process Viewer

Page 12: Backdoor

• Tripwire: Tripwire will automatically calculate cryptographic hashes of all key system files or any file that you want to monitor for modifications.

• Netstat:

Page 13: Backdoor

How to avoid a Trojan infection

Page 14: Backdoor

How to avoid a Trojan infection

Page 15: Backdoor

How to avoid a Trojan infection