Backdoors and Remote Access Tools Roy INSA Laboratory.

Slides:



Advertisements
Similar presentations
WS_FTP File Transfer Protocol For Windows. Settings for Makani Contact your own ISP for specifics.
Advertisements

Winconnect Server XP by John Mackenzie. What is Winconnect Server XP WinConnect Server XP is software for installation onto Windows XP Pro, which transforms.
MIS 304 Antoine Herve Chrome Remote Desktop BETA.
Week 6-1 Week 6: Trojans and Backdoors What is a Trojan Horse? Overt and Covert.
Simple Source Auditing Tools Roy INSA. Outline FLAWFINDER RATS.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
Introduction to TeamViewer
IERG4180 Tutorial 4 Jim.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
Proprietary & Confidential How to enable Windows Remote Desktop Connection.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Connecting To A Remote Computer Via ‘Remote Desktop Web Connection’ Compatible With ‘Most Any’ Computer.
1 Backdoors and Trojans. ECE Internetwork Security 2 Agenda Overview Netcat Trojans/Backdoors.
Week 2 File Systems & Unix Commands. File System Hierarchy.
Remote Control and Advanced Techniques. Remote Control Software What do they do? Connect through dial-in and/or TCP/IP. Replicate remote screen on local.
Computer Setup for EDA Tools Murali Dharan January 8, 2014 ELEC 7770 Spring 2014 Advanced VLSI Design 1/08/
Citrix and Terminal Services ian VITEK ixsecurity.
GeoADE - Geometric Algorithm Development Environment Tsai-Yeh Tung 2010/3/9 Web-based Collaboratory Lab, IIS, Academia Sinica, Taiwan Algorithmic Theory.
IXC softswitch light edition overview. System Requirements: Apple Mac mini, iMac, MacBook Pro, Mac Pro, MacBook Air OS X 10.7 or above VNC (as client.
Projects. High Performance Computing Projects Design and implement an HPC cluster with one master node and two compute nodes. (Hint: use Rocks HPC Cluster.
Network Security SSH Tunneling David Funk Matt McLaughlin Systems Administrators Computer Systems Support COE, University of Iowa.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
1.First Go to
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
Remote Desktop Services in Windows Server 2008 R2.
CPSC 233 Run graphical Java programs remotely on Mac and Windows.
A Study of Wireless Virtual Network Computing Kiran Erra.
Linux Essentials Chapter 2: Investigating Linux’s Principles and Philosophy.
Remote Controller & Presenter Make education more efficiently
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
Chapter 28 - Remote Login and Remote Desktops(TELNET) Introduction Early Computers Used Textual Interfaces A Timesharing System Requires User Identification.
Breaking Barriers Exploding with Possibility Breaking Barriers Exploding with Possibility The Cloud Era Unveiled.
MCSA Fall, Datacenter Foundation 15 users No virtualization 25 users 50 devices No virtualization Full functionality 2 virtual instances.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses.
Getting Started with the Virtual Computing Lab. Click on the URL:
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
SIMULATION OF MULTIPROCESSOR SYSTEM AND NETWORK Manish Patel Nov 8 th 2004 Advisor: Dr. Chung-E-Wang Department of Computer Science California State University,
Computer Communication: An example What happens when I click on
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
Holly Cate January 20, 2010 Main Bioinformatics Laboratory.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Remote Control and Advanced Techniques Lesson 16.
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
Setting up a remote office connection September 2011 Nick Maxwell.
Setting up a Printer. ♦ Overview Linux servers can be used in many different roles on a LAN. File and print servers are the most common roles played by.
Giovanni Fazzolari Lorenzo Lega Valeria Rania MitoTools.
Virtual Network Computing Sangmi Lee Oct,25,2000 Florida State University.
OGSA-DAI Tutorial Guy Warner and.
Backdoors and Trojans.
Chapter 7: Using Network Clients
Virtual Network Computing
A Study of Wireless Virtual Network Computing
Remote Control and Advanced Techniques
Metasploit Project For this exploit I will be using the following strategy Create backdoor exe file Upload file to website Have victim computer download.
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Rootkits Jonathan Hobbs.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
An introduction to the Linux environment v
Windows.
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Intro Cyber Security Labs on GENI
Intro Cyber Security Labs on GENI
Data Base.
Presentation transcript:

Backdoors and Remote Access Tools Roy INSA Laboratory

Introduction The goal is to control remotely

Outline Windows –VNC –NetBus Pro –BO –Sub7 Linux –STCPSHELL

VNC Simple Remote Assess Tool Desktop

Setup VNC Server

Connect to VNC Server

NetBus Pro Allow full control It isn’t as graphically friendly asVNC

Setup NetBus Server

Double Click

Back Orifice More functions Support plug-ins

Setup BO Server

Setup Client

Connect to Victim

SubSeven Sub7 is similar to BO2k and Netbus More convenient –Just execute file tml

Setup Sub7 Server

Connect to Victim

SCTPSHELL Create a virtual shell on victim’s computer Spoof TCP packets ServerIP SpoofingClient Server

Summary