Backdoor Attacks.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

By Hiranmayi Pai Neeraj Jain
Trojan Horse Program Presented by : Lori Agrawal.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
System and Network Security Practices COEN 351 E-Commerce Security.
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Beyond Security Ltd. Port Knocking Beyond Security Noam Rathaus CTO Sunday, July 11, 2004 Presentation on.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
CS391 Computer & Network Security
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
--Harish Reddy Vemula Distributed Denial of Service.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses.
Module 10: Windows Firewall and Caching Fundamentals.
Report of Hacking Attacks Subject: Firewall Date: Fri, 28 Apr :21: From: David Walsh To: Dr. Lin, I recently had ADSL installed.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Computer safety Filip Hruby.
Chapter 7: Using Windows Servers
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Software Applications for end-users
Chapter 4: Security Baselines
Cyber Security By: Pratik Gandhi.
FTP - File Transfer Protocol
Fix to Quick Heal Update Error 1002 Call
Call Fix to Norton Internet Security Error 3035, 6
Steps to fix AVG Error 0xe001f94e Call
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
CompTIA Security+ Study Guide (SY0-401)
How to allow USB Flash Drive Scan in Avast Antivirus.
McAfee.com/activate - Redeem McAfee Product Key to Activate McAfee
Risk of the Internet At Home
Internet Security Submitted to Professor Mort Anvari
ISMS Information Security Management System
Lab 7 – Defeating MALWARE
HOW DO I KEEP MY COMPUTER SAFE?
Lecture 3: Secure Network Architecture
WJEC GCSE Computer Science
Test 3 review FTP & Cybersecurity
Network Security Mark Creighton GBA 576 6/4/2019.
Internet Applications (Telnet, FTP)
IP Addresses & Ports IP Addresses – identify a device on a network
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Mcafee.com/activate
Presentation transcript:

Backdoor Attacks

What is Backdoor ? A backdoor is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a backdoor so that the program can be accessed for troubleshooting or other purposes. That sounds good !

What is Backdoor ? However, attackers often use backdoors that they detect or install themselves  to access the victim’s device.

How Hacking is Done ? Inject Trojan or any malicious code with the software. Trojan modify windows registry so that it can be run on every startup. Trojan Opens some ports so that attacker can access to victim device. Attacker uses your IP Address with port number to log in into your device!

Can Someone Get My IP Address ? Every computer you connect it to the internet will use your IP address to establish this connection. Some software that people use it in a daily basis may be unknowingly sharing their IP address ! Websites Received E-mail http://whatstheirip.com/

How Can You Get Hacked ? Social Media E-mail Websites (Sharing links between users) E-mail (Attachments ) Websites (Suspicious sites)

Protect Yourself ! Use the latest version of your antivirus, do periodically scan every day. Open links from trusted sources only. Network Monitoring . Be aware !

NetCat Netcat  is a computer networking utility for reading from and writing to network connections using TCP or UDP. Some of the potential uses of netcat: File transfers Scanning ports Firewall testing Network performance testing Server-Client chat system Troubleshooting