Backdoor
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
879
On Slideshare
879
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
26
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Trojan and Backdoor
    • Teams Group
      • - Nguyễn Mạnh Cường
      • - Nguyễn Hoàng Hoàn
      • - Cao Văn Tân
      • - Nguyễn Trung Tín
    Giáo viên hướng dẫn: - Phạm Văn Tính
  • 2.  
  • 3. Introduction
    • - What ‘s Trojan ?: It’s a program runs hidden on an infected computer
    • - What’s A backdoor ?:It is any type of program that will allow a hacker to connect to a computer without going through the normal authentication process
    • - What’s is used ?: allow a hacker remote access to your system, start a keystroke logger to record your every keystroke, plant a backdoor on your system, cause a DoS , or even disable your antivirus protection or software firewall.
  • 4. Trojan Types
  • 5. Trojan Infection Mechanisms
  • 6. Distributing Trojans
    • - Wrapper: A wrapper is a program used to combine two or more executables into a single packaged program.
  • 7. Change icon, defacing application
  • 8. Infecting via CD-ROM, USB
    • An Autorun.inf file
    • [ autorun]
      • open=setup.exe
      • icon=setup.exe
    • Turn off the Auto-Start functionality by doing the following:
    • Start button-> Settings-> Control Panel-> System-> Device Manager-> CDROM-> Properties -> Settings
  • 9. Hacking Tool
    • Firekiller 2000 : will kill (if executed) any resistant protection software.
    • ICMP Tunneling
    • Reverse WWW Shell
    ICMP Tunneling
  • 10. Backdoor, Trojan Countermeasures
    • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
    • Educate your users not to install applications downloaded from the internet and e-mail attachments.
  • 11. Process Viewer
  • 12.
    • Tripwire : Tripwire will automatically calculate cryptographic hashes of all key system files or any file that you want to monitor for modifications.
    • Netstat:
  • 13. How to avoid a Trojan infection
  • 14. How to avoid a Trojan infection
  • 15. How to avoid a Trojan infection