Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.

Slides:



Advertisements
Similar presentations
Winconnect Server XP by John Mackenzie. What is Winconnect Server XP WinConnect Server XP is software for installation onto Windows XP Pro, which transforms.
Advertisements

Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Week 6-1 Week 6: Trojans and Backdoors What is a Trojan Horse? Overt and Covert.
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
Information Networking Security and Assurance Lab National Chung Cheng University 2004/03/041 Auditing your Microsoft Windows system Host-Based Intrusion.
2004, Jei Nessus A Vulnerability Assessment tool A Security Scanner Information Networking Security and Assurance Lab National Chung Cheng University
Backdoors and Remote Access Tools Roy INSA Laboratory.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Information Networking Security and Assurance Lab National Chung Cheng University F.I.R.E. Forensics & Incident Response Environment.
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
2004, Jei F.I.R.E. Forensics & Incident Response Environment Information Networking Security and Assurance Lab National Chung Cheng University.
Information Networking Security and Assurance Lab National Chung Cheng University Yaha.
Information Networking Security and Assurance Lab National Chung Cheng University Anti-hacker Tool Kit: CH13 Port Redirection Jared 04/03/31.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Proprietary & Confidential How to enable Windows Remote Desktop Connection.
1 MASTERING (VIRTUAL) NETWORKS A Case Study of Virtualizing Internet Lab Avin Chen Borokhovich Michael Goldfeld Arik.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
1 Backdoors and Trojans. ECE Internetwork Security 2 Agenda Overview Netcat Trojans/Backdoors.
Week 2 File Systems & Unix Commands. File System Hierarchy.
GeoADE - Geometric Algorithm Development Environment Tsai-Yeh Tung 2010/3/9 Web-based Collaboratory Lab, IIS, Academia Sinica, Taiwan Algorithmic Theory.
Network Security SSH Tunneling David Funk Matt McLaughlin Systems Administrators Computer Systems Support COE, University of Iowa.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
Module 5: Configuring Access for Remote Clients and Networks.
Remote Desktop Services in Windows Server 2008 R2.
CPSC 233 Run graphical Java programs remotely on Mac and Windows.
A Study of Wireless Virtual Network Computing Kiran Erra.
Linux Essentials Chapter 2: Investigating Linux’s Principles and Philosophy.
Remote Controller & Presenter Make education more efficiently
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Kickstart Installation
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
MCSA Fall, Datacenter Foundation 15 users No virtualization 25 users 50 devices No virtualization Full functionality 2 virtual instances.
Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses.
Getting Started with the Virtual Computing Lab. Click on the URL:
Unix Servers Used in This Class  Two Unix servers set up in CS department will be used for some programming projects  Machine name: eustis.eecs.ucf.edu.
SIMULATION OF MULTIPROCESSOR SYSTEM AND NETWORK Manish Patel Nov 8 th 2004 Advisor: Dr. Chung-E-Wang Department of Computer Science California State University,
Computer Communication: An example What happens when I click on
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
The Tech that supports the Net Net Tech for CBIS.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
Setting up a remote office connection September 2011 Nick Maxwell.
Setting up a Printer. ♦ Overview Linux servers can be used in many different roles on a LAN. File and print servers are the most common roles played by.
Virtual Network Computing Sangmi Lee Oct,25,2000 Florida State University.
OGSA-DAI Tutorial Guy Warner and.
Backdoors and Trojans.
Chapter 7: Using Network Clients
PART 1 – FILE UPLOAD BACKDOORS: METASPLOIT
Virtual Network Computing
A Study of Wireless Virtual Network Computing
Remote Control and Advanced Techniques
FTP - File Transfer Protocol
ما هي خدمة بروتوكول نقل الملفات؟
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
IS 4506 Server Configuration (HTTP Server)
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Windows.
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Protocols 2 Key Revision Points.
Intro Cyber Security Labs on GENI
Debug Tools (GDB+DDD) on Andes platform
Intro Cyber Security Labs on GENI
IS 4506 Configuring the FTP Service
Presentation transcript:

Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory

Information Networking Security and Assurance Lab National Chung Cheng University 2 Introduction The goal is to control remotely

Information Networking Security and Assurance Lab National Chung Cheng University 3 Outline Windows  VNC  NetBus Pro  BO  Sub7 Linux  STCPSHELL

Information Networking Security and Assurance Lab National Chung Cheng University 4 VNC Simple Remote Assess Tool Desktop

Information Networking Security and Assurance Lab National Chung Cheng University 5 Setup VNC Server

Information Networking Security and Assurance Lab National Chung Cheng University 6 Connect to VNC Server

Information Networking Security and Assurance Lab National Chung Cheng University 7 NetBus Pro Allow full control It isn’t as graphically friendly asVNC

Information Networking Security and Assurance Lab National Chung Cheng University 8 Setup NetBus Server

Information Networking Security and Assurance Lab National Chung Cheng University 9 Double Click

Information Networking Security and Assurance Lab National Chung Cheng University 10 Back Orifice More functions Support plug-ins

Information Networking Security and Assurance Lab National Chung Cheng University 11 Setup BO Server

Information Networking Security and Assurance Lab National Chung Cheng University 12 Setup Client

Information Networking Security and Assurance Lab National Chung Cheng University 13 Connect to Victim

Information Networking Security and Assurance Lab National Chung Cheng University 14 SubSeven Sub7 is similar to BO2k and Netbus More convenient  Just execute file

Information Networking Security and Assurance Lab National Chung Cheng University 15 Setup Sub7 Server

Information Networking Security and Assurance Lab National Chung Cheng University 16 Connect to Victim

Information Networking Security and Assurance Lab National Chung Cheng University 17 SCTPSHELL Create a virtual shell on victim’s computer Spoof TCP packets Server IP Spoofing Client Server

Information Networking Security and Assurance Lab National Chung Cheng University 18 Summary