Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.

Similar presentations


Presentation on theme: "Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause."— Presentation transcript:

1 Trojans Daniel Bartsch CPSC 420 April 19,2007

2 What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause a variety of undesired effects Not simple to define! ©2007 Steve Smith and World of Stock http://images.worldofstock.com/slides/BTE1174.jpg

3 Why are Trojans Hard to Define? Definition creep! Should only refer only to infected file Term expanded to refer to effects file has as well Trickery used to prevent program removal commonly classified as trojan

4 A Trojan is Not A Virus Confusion caused by virus scanners Viruses infect other files The goals are different Viruses do not rely on tricking the user Viruses do require action from the user

5 A Trojan is Not a Worm Worms do not require action from the user Worms exploit security flaws Worms spread themselves Worms typically make multiple copies of themselves

6 What are Some Properties of Trojans? Use trickery in some form Do not typically spread themselves File they are attached to has to be put into use at least once Have means to continue running Can be added to virtually anything

7 What Kinds of Trickery do Trojans Use? Highly desirable files Exclusive Rare Free Codec Packs Bootlegs New files No CD cracks Key Generators

8 What Kinds of Trickery do Trojans Use? Disguises Fake error messages Lies from the sender Rootkits Encryption Vague process names

9 What Kinds of Things are Trojans Used for? Pranks Make some zombies Denial of service attacks Proxies Servers Spam Mess with data

10 What Kinds of Things are Trojans Used for? Disabling security software - the blended threat Spying Key logging Drive Access Spyware and Adware Backdoors

11 What Kinds of Things are Trojans Used for? Remote Administration

12 What are Some Common Trojans? BO2K NetBus SubSeven SpySheriff

13 BO2K Free program marketed as a RAT Reputation caused classification Windows 2000, NT, XP Actively Developed Continuation of Back Orifice

14 Some Features of BO2K Key logging Registry Editing Remote upgrade and installation Connection redirection Audio and video capture Remote Reboot

15 BO2K in Action

16 NetBus Intended for pranks Famously used to put child pornography on Magnus Ericson’s computer

17 SubSeven Allows attacker to lock out other attackers Early versions included a master password

18 Optix Pro Fully customizable Can disable security No longer in development

19 Optix Pro Configuration

20

21

22

23 SpySheriff Not a Remote Administration Trojan Masquerades as a spyware scanner Blocks connections, Disables internet connections, prevents system restores Can reinstall itself and give itself administrative rights

24 SpySheriff

25 One Famous Use of a Trojan US learned of a Soviet plot to steal turbine control software Leaked software with a trojan Software used in Trans-Siberian gas pipeline Caused one of the largest non-nuclear explosions and fires ever

26 Dealing with Trojans Research required to remove any Trojan that a virus scanner can’t remove by itself Preventative measures are best Multiple firewalls Disconnect computers from networks if use of a RAT is suspected

27 Sources http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp http://www.webopedia.com/TERM/T/Trojan_horse.html http://cpsc420.cs.clemson.edu/material/Malware/Trojan%20Horses.jnt – authentication required http://cpsc420.cs.clemson.edu/material/Malware/Trojan%20Horses.jnt http://computer.howstuffworks.com/virus.htm http://pcworld.about.com/news/Jul122005id121793.htm http://www.bleepingcomputer.com/forums/topic22402.html http://hackpr.net/~sub7/faq.shtml#CA.1 http://www.symantec.com/avcenter/warn/backorifice.html http://bo2k.sourceforge.net/docs/bo2k_pressrelease.html http://bo2k.sourceforge.net/featurelist.html http://radsoft.net/resources/rants/20041128,00.shtml http://www.windowsecurity.com/articles/Student-Teacher-Optix-Pro-Part2.html http://www.taipeitimes.com/News/editorials/archives/2004/02/04/2003097438/print http://en.wikipedia.org/wiki/Zombie_computer http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29 http://en.wikipedia.org/wiki/Pest_Trap http://en.wikipedia.org/wiki/SubSeven http://en.wikipedia.org/wiki/Back_Orifice_2000 http://en.wikipedia.org/wiki/NetBus http://en.wikipedia.org/wiki/Optix_Pro http://en.wikipedia.org/wiki/List_of_trojan_horses

28 Any Questions? Trojan Rabbit from Monty Python and the Holy Grail


Download ppt "Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause."

Similar presentations


Ads by Google