Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses.

Slides:



Advertisements
Similar presentations
Week 6-1 Week 6: Trojans and Backdoors What is a Trojan Horse? Overt and Covert.
Advertisements

Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Ethical Hacking by Shivam.
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Backdoors and Remote Access Tools Roy INSA Laboratory.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Enterprise Network Security Accessing the WAN Lecture week 4.
COEN 252: Computer Forensics Router Investigation.
Information about the computer By Sophia and Christina C.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Remote Control and Advanced Techniques. Remote Control Software What do they do? Connect through dial-in and/or TCP/IP. Replicate remote screen on local.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Settings.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 14: Remote Server Administration BAI617. Chapter Topics Configure Windows Server 2008 R2 servers for remote administration Remotely connect to.
Module 4: Add Client Computers and Devices to the Network.
Cyber crime & Security Prepared by : Rughani Zarana.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Spyware, Viruses and Malware What the fuss is all about.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
FORESEC Academy FORESEC Academy Security Essentials (III)
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Blueberry Software IT Security Audit Results. Results: Good.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Backdoors and Rootkits.
TCOM Information Assurance Management System Hacking.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Malicious Software.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
KaaShiv InfoTech Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
By Mohammad Alsawwaf. To apply the theory part from my last presentation into the application part (The lab)
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Computer Security By Duncan Hall.
Using technology to teach? We provide assistance and classroom support.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Introduction to Networking. What is a Network? Discuss in groups.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Seminar On Ethical Hacking Submitted To: Submitted By:
Backdoor Attacks.
Employee clicks on fake
Viruses and Other Malicious Content
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
NET 311 Information Security
Belkin Router Customer Service
About Callpcexperts Independent technical support service provider World Class Service Experienced technicians Quick solutions.
With so many major corporations and people falling victim to cybercrimes and with viruses and malware infecting several computers and networks around.
Unit 27: Network Operating Systems
Viruses and Virus Protection
Malware CJ
Troubleshoot AOL Desktop Gold Problems Get services.com.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Backdoor Programs Trisha Arocena

2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Backdoor programs as admin application tools Developed in 1990 Means of access to a computer program that bypasses security mechanisms

Remote Administration & Troubleshooting

Security

Direct Connection

Reverse Connection

Backdoor programs as viruses Program installed to victim computer to be accessed at a later time Usually no trace of entry - undetected

Common types of backdoor programs: Back Orifice / Back Orifice 2000 Netbus / Netbus 2.0 Pro SubSeven / Sub7

Example Default BIOS, router or switch passwords

Gives entry way to malicious files attached with virus Sometimes remain dormant and once activated, it can penetrate your computer

Backdoors can penetrate via: Remote vulnerabilities P2P networks

Protection

Time’s Up! Thank you for listening