SlideShare a Scribd company logo
1 of 14
By mridul ahuja
9911103486
JIIT – 128
A backdoor in a computer system is a
method of bypassing normal
authentication, securing unauthorized
remote access to a computer, while
attempting to remain undetected.
Backdoor Trojan can be extremely harmful
if not dealt with appropriately. The main
function of this type of virus is to create a
backdoor in order to access a specific
system.
These backdoors are classified as Trojans
if they do not attempt to inject themselves
into other files.The backdoor may take the
form of an installed program (e.g. Back
Orifice) or may subvert the system through
a rootkit.
Crashing the computer, e.g. with "blue
screen of death" (BSOD)
Data corruption
Electronic money theft
Data theft, including confidential files,
sometimes for industrial espionage
Downloading or uploading of files for
various purposes
Keystroke logging
Downloading and installing software,
including third-party malware and
ransomware
Watching the user's screen
Viewing the user's webcam
Modifications of registry
Linking computer to botnet
 Netbus Advance System Care
 Subseven or Sub7
 Back Orifice (Sir Dystic)
 Beast
 Zeus
 Flashback Trojan (Trojan
BackDoor.Flashback)
 ZeroAccess
 Koobface
 Vundo
The threat of backdoors surfaced when
multiuser and networked operating
systems became widely adopted.
Harder to detect backdoors involve
modifying object code, rather than source
code
Running processes are dissected and
modules being used in each one of them
are extracted.
If any module matches with a virus
module, the program checks if any port is
being used by that process.
If any port is found , the process may be a
virus .
 Hunting for Metamorphic Engines by Wing Wong ,
Mark Stamp
 Hunting for Undetectable Metamorphic Virus by Da
Lin
 Detecting RATs through dynamic analysis using Finite-
State Machines by Gardåsen, Kjetil Tangen
 Remote Administrative Tools : A Comparative Study by
Anis Ismail, Mohammad Hajjar, Haissam Hajjar
 Remote Administrative Trojan/Tool (RAT) by Manjeri N.
Kondalwar , Prof. C.J. Shelke
Detection of running backdoors

More Related Content

What's hot

What's hot (20)

Dickmaster
DickmasterDickmaster
Dickmaster
 
Operating system security
Operating system securityOperating system security
Operating system security
 
O p
O pO p
O p
 
Persistence in windows
Persistence in windowsPersistence in windows
Persistence in windows
 
What is BFE.DLL?
What is BFE.DLL?What is BFE.DLL?
What is BFE.DLL?
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Protection and security
Protection and securityProtection and security
Protection and security
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Security
SecuritySecurity
Security
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 
Spo1 t18
Spo1 t18Spo1 t18
Spo1 t18
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
System security
System securitySystem security
System security
 
Computer securety
Computer securetyComputer securety
Computer securety
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
TIC
TICTIC
TIC
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 

Similar to Detection of running backdoors

Similar to Detection of running backdoors (20)

Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Methods of Cybersecurity Attacks
Methods of Cybersecurity AttacksMethods of Cybersecurity Attacks
Methods of Cybersecurity Attacks
 
Basics of hacking
Basics of hackingBasics of hacking
Basics of hacking
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Malwares
MalwaresMalwares
Malwares
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
Computer security
Computer securityComputer security
Computer security
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer security
Computer securityComputer security
Computer security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Security threats
Security threatsSecurity threats
Security threats
 
System tThreats
System tThreatsSystem tThreats
System tThreats
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 

Detection of running backdoors

  • 2. A backdoor in a computer system is a method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected.
  • 3. Backdoor Trojan can be extremely harmful if not dealt with appropriately. The main function of this type of virus is to create a backdoor in order to access a specific system.
  • 4. These backdoors are classified as Trojans if they do not attempt to inject themselves into other files.The backdoor may take the form of an installed program (e.g. Back Orifice) or may subvert the system through a rootkit.
  • 5. Crashing the computer, e.g. with "blue screen of death" (BSOD) Data corruption Electronic money theft Data theft, including confidential files, sometimes for industrial espionage Downloading or uploading of files for various purposes
  • 6. Keystroke logging Downloading and installing software, including third-party malware and ransomware Watching the user's screen Viewing the user's webcam Modifications of registry Linking computer to botnet
  • 7.  Netbus Advance System Care  Subseven or Sub7  Back Orifice (Sir Dystic)  Beast  Zeus  Flashback Trojan (Trojan BackDoor.Flashback)  ZeroAccess  Koobface  Vundo
  • 8.
  • 9. The threat of backdoors surfaced when multiuser and networked operating systems became widely adopted. Harder to detect backdoors involve modifying object code, rather than source code
  • 10. Running processes are dissected and modules being used in each one of them are extracted. If any module matches with a virus module, the program checks if any port is being used by that process. If any port is found , the process may be a virus .
  • 11.
  • 12.
  • 13.  Hunting for Metamorphic Engines by Wing Wong , Mark Stamp  Hunting for Undetectable Metamorphic Virus by Da Lin  Detecting RATs through dynamic analysis using Finite- State Machines by Gardåsen, Kjetil Tangen  Remote Administrative Tools : A Comparative Study by Anis Ismail, Mohammad Hajjar, Haissam Hajjar  Remote Administrative Trojan/Tool (RAT) by Manjeri N. Kondalwar , Prof. C.J. Shelke