15
Backdoor Programs Trisha Arocena

Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Embed Size (px)

Citation preview

Page 1: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Backdoor Programs

Trisha Arocena

Page 2: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

2 types

1. Backdoor programs as administrative application tools

2. Backdoor programs as viruses

Page 3: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Backdoor programs as admin application tools

• Developed in 1990

• Means of access to a computer program that bypasses security mechanisms

Page 4: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Remote Administration & Troubleshooting

Page 5: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Security

Page 6: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Direct Connection

Page 7: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Reverse Connection

Page 8: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Backdoor programs as viruses

• Program installed to victim computer to be accessed at a later time

• Usually no trace of entry - undetected

Page 9: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Common types of backdoor programs:

• Back Orifice / Back Orifice 2000

• Netbus / Netbus 2.0 Pro

• SubSeven / Sub7

Page 10: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Example

• Default BIOS, router or switch passwords

Page 11: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

• Gives entry way to malicious files attached with virus

• Sometimes remain dormant and once activated, it can penetrate your computer

Page 12: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Backdoors can penetrate via:

• E-mail

• Remote vulnerabilities

• P2P networks

Page 13: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses
Page 14: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Protection

Page 15: Backdoor Programs Trisha Arocena. 2 types 1.Backdoor programs as administrative application tools 2. Backdoor programs as viruses

Time’s Up!

Thank you for listening