Backdoor

858 views
775 views

Published on

Quan Tri Mang

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
858
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
37
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Backdoor

  1. 1. Trojan and Backdoor <ul><li>Teams Group </li></ul><ul><ul><li>- Nguyễn Mạnh Cường </li></ul></ul><ul><ul><li>- Nguyễn Hoàng Hoàn </li></ul></ul><ul><ul><li>- Cao Văn Tân </li></ul></ul><ul><ul><li>- Nguyễn Trung Tín </li></ul></ul>Giáo viên hướng dẫn: - Phạm Văn Tính
  2. 3. Introduction <ul><li>- What ‘s Trojan ?: It’s a program runs hidden on an infected computer </li></ul><ul><li>- What’s A backdoor ?:It is any type of program that will allow a hacker to connect to a computer without going through the normal authentication process </li></ul><ul><li>- What’s is used ?: allow a hacker remote access to your system, start a keystroke logger to record your every keystroke, plant a backdoor on your system, cause a DoS , or even disable your antivirus protection or software firewall. </li></ul>
  3. 4. Trojan Types
  4. 5. Trojan Infection Mechanisms
  5. 6. Distributing Trojans <ul><li>- Wrapper: A wrapper is a program used to combine two or more executables into a single packaged program. </li></ul>
  6. 7. Change icon, defacing application
  7. 8. Infecting via CD-ROM, USB <ul><li>An Autorun.inf file </li></ul><ul><li>[ autorun] </li></ul><ul><ul><li>open=setup.exe </li></ul></ul><ul><ul><li>icon=setup.exe </li></ul></ul><ul><li>Turn off the Auto-Start functionality by doing the following: </li></ul><ul><li>Start button-> Settings-> Control Panel-> System-> Device Manager-> CDROM-> Properties -> Settings </li></ul>
  8. 9. Hacking Tool <ul><li>Firekiller 2000 : will kill (if executed) any resistant protection software. </li></ul><ul><li>ICMP Tunneling </li></ul><ul><li>Reverse WWW Shell </li></ul>ICMP Tunneling
  9. 10. Backdoor, Trojan Countermeasures <ul><li>Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail) </li></ul><ul><li>Educate your users not to install applications downloaded from the internet and e-mail attachments. </li></ul>
  10. 11. Process Viewer
  11. 12. <ul><li>Tripwire : Tripwire will automatically calculate cryptographic hashes of all key system files or any file that you want to monitor for modifications. </li></ul><ul><li>Netstat: </li></ul>
  12. 13. How to avoid a Trojan infection
  13. 14. How to avoid a Trojan infection
  14. 15. How to avoid a Trojan infection

×