Botnets and Remote Administration Tools

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
By Frank Perez 9D Qatar Academy Quite simply, the problem is that people have been given the ability to download files such as music and software for.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Computer Security By Duncan Hall.
By Frank Perez 9D Qatar Academy Quite simply, the problem is that people have been given the ability to download files such as music and software for.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
For more information on Rouge, visit:
Cyber security. Malicious Code Social Engineering Detect and prevent.
Hair Products for Baby: Importance. Babies as we all know are very delicate and that is why you will find most parents protecting their babies from certain.
Chapter 40 Internet Security.
Viruses & Destructive Programs
Hacking Computer crime and cyber security.
Understanding computer systems
Unit 4 IT Security.
Welcome to Milton’s Parts Express
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Contact Norton Support Canada for Firewall Issues.
Homeland Security: Computer Protection
Various Types of Malware
COMPUTER VIRUSES Computer Technology.
How to build a good reputation online
Dangers of the internet
Cyber Security By: Pratik Gandhi.
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
bcb
computer virus infection & symptoms
Unit 4 IT Security.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
How to Get Rid of Online Threats Impacting your Computer Device?
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
STOP. THINK. CONNECT. Online Safety Quiz.
Dangerous Types Of Malware. What is Malware Malware is a term used to denote the different types of intrusive software that are installed with the intent.
Contact Norton Antivirus | Norton Antivirus Support UK
Risk of the Internet At Home
Forensics Week 12.
The Internet of Unsecure Things
Get Rid of a Trojan Horse? Even with a competent anti-virus installed, PCs could still be susceptible to malicious programs such.
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Top Five Computer Related Crimes
Faculty of Science IT Department By Raz Dara MA.
Follow safety rules so that YOU: Avoid getting HURT.
Bethesda Cybersecurity Club
Computer Security By: Muhammed Anwar.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
What devices use the internet?
Data Recovery: Why Secure Deletion is so Important.
Marcial Quinones-Cardona
Cleaning Up the Internet of Evil Things
Presentation transcript:

Botnets and Remote Administration Tools Marcial Quinones-Cardona Marcial Quinones-Cardona

My Background with Botnets & RATS When I was younger, I had friends who were into using Botnets and RATS I found myself accessing forums to gain knowledge on using them Used them for about a year, mostly to gain advantage in gaming Also used them to show my friends what things you could do if you had access to someone’s computer I was a victim of being a part of a botnet a few times. Additionally, I have been a victim of Remote Administration Tools too.

What is a Botnet? Botnet is a group of infected computers who are all infected by malicious software, whether it be controlled by a group of people or one individual. Once a hacker has a bunch of infected computers in his arsenal (on his botnet), he/she has the ability to do many harmful things. These include DDoS (Distributed Denial of Service) attacks, stealing user data from their computer, and much more.

Are Botnets legal? Technically, yes. Botnets can be used to help websites online. However, hackers have turned a good thing into an evil thing and some people create these tools for profit in which they sell to hackers. While a good Botnet may assist in relaying chats so that the user experience is lightened and more user friendly, there are the malicious illegal botnets that can take complete control over your computer.

Who are the targets of Botnets? You might think that high level companies are the targets of botnets. This might be true in some cases, but these hackers just want to infect as many people as they can. Majority of the attacks are done on IoT (Internet of Things) devices or anything that can easily be breached. Because things like Fridges and even cars now-a-days have weak passwords to protect them, a hacker can easily breach these items.

Remote Admin Tools/Trojans Remote Admin Tools are very similar to botnets in a way. They may be more advanced and complex and you have a wide variety of options to perform that Botnets might not have. With RATs, you have complete access to your “victim’s” computer. You can control their mouse and keyboard, open and close their disc tray, download files onto their computer as well as download their files onto your computer, and much more. There are legal tools in which trained professionals or big companies would use to assist you in any type of computer program issue you are having. These tech companies may ask if they can access your computer remotely and see if they can fix the problem. However, there are the malicious programs as mentioned above that can be used for evil, rather than good.

Remote Admin Tools/Trojans Cont. Unlike Botnets, removing a RAT might be a little harder. The program that was executed runs in the background. These items can be renamed to similar services that Microsoft PCs use so that the user might not even recognize that what they are seeing is actually a malicious program. When creating the stub, which is the infected software the hacker will send to people, these hackers will have the option to choose what directory the virus will go to.

Some Questions to Ask Some questions to ask is how can we prevent these botnet and malicious RAT spreading? Everyday people are targeted based on the things that they like and are tricked into downloading malicious files that they think will benefit them, when they are actually phony. How can we prevent IoT devices to be breached and used for malicious purposes?

Idea to Possibly Prevent these Attacks Botnets and RATs are fairly easy to avoid if you have common sense and knowledge of computers. Simply put, don’t download strange files online, stay away from illegal music and torrenting, and make sure to have some sort of firewall or anti-virus enabled.