Chapter 11 - Trojans & Other Attacks Flashcards
Overt Channesl vs Covert Channels
Overt - legitimate communication channels used by programs. Covert Channels - Used to transport data in unintended ways.
Wrappers
Programs that allow you to bind an executable to an innocent file
Crypters
Use a combination of encryption and code manipulation to render malware undetectable to security programs.
Packers
Use compression to pack the executable which helps evade signature based detection.
Infinity
Exploit Kit
Bleeding Life
Exploit Kit
Crimepack
Exploit Kit
Blackhole
Exploit Kit
What is an exploit kit?
Helps deliver exploits and payloads.
Proxy Server Trojan
Allows attacker to use the target system as a proxy.’
Chebacca
Botnet Trojan
Skynet
Botnet Trojan
Botnet Trojan
Turns the computer into bot
RAT
Remote access Trojan
MoSucker
Remote Access Trojan
Optix Pro
Remote Access Trojan
Blackhole
Remote access trojan
Zeus
E-Banking Trojans
Spyeye
E-Banking Trojans
Command Shell Trojan
Provides a backdoor to connect to through command-line access
Netcat
With malicious intent, can be considered as a trojan
Trojan - Death
Port 2
Trojan - Senna Spy
Port 20
Trojan - Hacker’s Paradise
Port 31, 456
Trojan - TCP Wrappers
Port 421
Trojan - Doom, Satanz Backdoor
Port 666
Trojan - Silencer, WebEx
Port 1001
Trojan - RAT
Port 1095-98
Trojan - SubSeven
Port 1243
Trojan - Shiva-Burka
Port 1600
Trojan - Trojan Cow
Port 2001
Trojan - Deep Throat
Port 6670-71
Trojan - Tini
Port 7777
Trojan - NetBus
Port 12345-6
Trojan - Whack a Mole
Port 12361-3
Trojan - Black Orifice
Port 31337, 31338
Netstat -an
Shows open ports in numerical order
Netstat -b
Displays all active connections and the processing using them
Process Explorer
Microsoft tool that shows you everything about running processes
SysAnalyzer
Registry monitoring tool
Tiny Watcher
Registry monitoring tool
Active Registry Monitor
Registry monitoring tool
Regshot
Registry monitoring tool
Msconfig
Windows program that shows all programs set to start on startup