Chapter 11 - Trojans & Other Attacks Flashcards
Overt Channesl vs Covert Channels
Overt - legitimate communication channels used by programs. Covert Channels - Used to transport data in unintended ways.
Wrappers
Programs that allow you to bind an executable to an innocent file
Crypters
Use a combination of encryption and code manipulation to render malware undetectable to security programs.
Packers
Use compression to pack the executable which helps evade signature based detection.
Infinity
Exploit Kit
Bleeding Life
Exploit Kit
Crimepack
Exploit Kit
Blackhole
Exploit Kit
What is an exploit kit?
Helps deliver exploits and payloads.
Proxy Server Trojan
Allows attacker to use the target system as a proxy.’
Chebacca
Botnet Trojan
Skynet
Botnet Trojan
Botnet Trojan
Turns the computer into bot
RAT
Remote access Trojan
MoSucker
Remote Access Trojan
Optix Pro
Remote Access Trojan
Blackhole
Remote access trojan
Zeus
E-Banking Trojans
Spyeye
E-Banking Trojans
Command Shell Trojan
Provides a backdoor to connect to through command-line access
Netcat
With malicious intent, can be considered as a trojan
Trojan - Death
Port 2
Trojan - Senna Spy
Port 20
Trojan - Hacker’s Paradise
Port 31, 456