Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Trojan Horse Program Presented by : Lori Agrawal.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Security and Penetration Testing
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Internet safety By Suman Nazir
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Chapter 40 Internet Security.
What they are and how to protect against them
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
Level 2 Diploma Unit 11 IT Security
Various Types of Malware
Level 2 Diploma Unit 11 IT Security
NET 311 Information Security
Computer Applications Unit B
Malware CJ
Malicious Software Network security Master:Mr jangjou
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Presentation transcript:

Trojans Daniel Bartsch CPSC 420 April 19,2007

What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause a variety of undesired effects Not simple to define! ©2007 Steve Smith and World of Stock

Why are Trojans Hard to Define? Definition creep! Should only refer only to infected file Term expanded to refer to effects file has as well Trickery used to prevent program removal commonly classified as trojan

A Trojan is Not A Virus Confusion caused by virus scanners Viruses infect other files The goals are different Viruses do not rely on tricking the user Viruses do require action from the user

A Trojan is Not a Worm Worms do not require action from the user Worms exploit security flaws Worms spread themselves Worms typically make multiple copies of themselves

What are Some Properties of Trojans? Use trickery in some form Do not typically spread themselves File they are attached to has to be put into use at least once Have means to continue running Can be added to virtually anything

What Kinds of Trickery do Trojans Use? Highly desirable files Exclusive Rare Free Codec Packs Bootlegs New files No CD cracks Key Generators

What Kinds of Trickery do Trojans Use? Disguises Fake error messages Lies from the sender Rootkits Encryption Vague process names

What Kinds of Things are Trojans Used for? Pranks Make some zombies Denial of service attacks Proxies Servers Spam Mess with data

What Kinds of Things are Trojans Used for? Disabling security software - the blended threat Spying Key logging Drive Access Spyware and Adware Backdoors

What Kinds of Things are Trojans Used for? Remote Administration

What are Some Common Trojans? BO2K NetBus SubSeven SpySheriff

BO2K Free program marketed as a RAT Reputation caused classification Windows 2000, NT, XP Actively Developed Continuation of Back Orifice

Some Features of BO2K Key logging Registry Editing Remote upgrade and installation Connection redirection Audio and video capture Remote Reboot

BO2K in Action

NetBus Intended for pranks Famously used to put child pornography on Magnus Ericson’s computer

SubSeven Allows attacker to lock out other attackers Early versions included a master password

Optix Pro Fully customizable Can disable security No longer in development

Optix Pro Configuration

SpySheriff Not a Remote Administration Trojan Masquerades as a spyware scanner Blocks connections, Disables internet connections, prevents system restores Can reinstall itself and give itself administrative rights

SpySheriff

One Famous Use of a Trojan US learned of a Soviet plot to steal turbine control software Leaked software with a trojan Software used in Trans-Siberian gas pipeline Caused one of the largest non-nuclear explosions and fires ever

Dealing with Trojans Research required to remove any Trojan that a virus scanner can’t remove by itself Preventative measures are best Multiple firewalls Disconnect computers from networks if use of a RAT is suspected

Sources – authentication required

Any Questions? Trojan Rabbit from Monty Python and the Holy Grail