2. A backdoor in a computer system is a
method of bypassing normal
authentication, securing unauthorized
remote access to a computer, while
attempting to remain undetected.
3. Backdoor Trojan can be extremely harmful
if not dealt with appropriately. The main
function of this type of virus is to create a
backdoor in order to access a specific
system.
4. These backdoors are classified as Trojans
if they do not attempt to inject themselves
into other files.The backdoor may take the
form of an installed program (e.g. Back
Orifice) or may subvert the system through
a rootkit.
5. Crashing the computer, e.g. with "blue
screen of death" (BSOD)
Data corruption
Electronic money theft
Data theft, including confidential files,
sometimes for industrial espionage
Downloading or uploading of files for
various purposes
6. Keystroke logging
Downloading and installing software,
including third-party malware and
ransomware
Watching the user's screen
Viewing the user's webcam
Modifications of registry
Linking computer to botnet
7. Netbus Advance System Care
Subseven or Sub7
Back Orifice (Sir Dystic)
Beast
Zeus
Flashback Trojan (Trojan
BackDoor.Flashback)
ZeroAccess
Koobface
Vundo
8.
9. The threat of backdoors surfaced when
multiuser and networked operating
systems became widely adopted.
Harder to detect backdoors involve
modifying object code, rather than source
code
10. Running processes are dissected and
modules being used in each one of them
are extracted.
If any module matches with a virus
module, the program checks if any port is
being used by that process.
If any port is found , the process may be a
virus .
11.
12.
13. Hunting for Metamorphic Engines by Wing Wong ,
Mark Stamp
Hunting for Undetectable Metamorphic Virus by Da
Lin
Detecting RATs through dynamic analysis using Finite-
State Machines by Gardåsen, Kjetil Tangen
Remote Administrative Tools : A Comparative Study by
Anis Ismail, Mohammad Hajjar, Haissam Hajjar
Remote Administrative Trojan/Tool (RAT) by Manjeri N.
Kondalwar , Prof. C.J. Shelke