SlideShare a Scribd company logo
By mridul ahuja
9911103486
JIIT – 128
A backdoor in a computer system is a
method of bypassing normal
authentication, securing unauthorized
remote access to a computer, while
attempting to remain undetected.
Backdoor Trojan can be extremely harmful
if not dealt with appropriately. The main
function of this type of virus is to create a
backdoor in order to access a specific
system.
These backdoors are classified as Trojans
if they do not attempt to inject themselves
into other files.The backdoor may take the
form of an installed program (e.g. Back
Orifice) or may subvert the system through
a rootkit.
Crashing the computer, e.g. with "blue
screen of death" (BSOD)
Data corruption
Electronic money theft
Data theft, including confidential files,
sometimes for industrial espionage
Downloading or uploading of files for
various purposes
Keystroke logging
Downloading and installing software,
including third-party malware and
ransomware
Watching the user's screen
Viewing the user's webcam
Modifications of registry
Linking computer to botnet
 Netbus Advance System Care
 Subseven or Sub7
 Back Orifice (Sir Dystic)
 Beast
 Zeus
 Flashback Trojan (Trojan
BackDoor.Flashback)
 ZeroAccess
 Koobface
 Vundo
Detection of running backdoors
The threat of backdoors surfaced when
multiuser and networked operating
systems became widely adopted.
Harder to detect backdoors involve
modifying object code, rather than source
code
Running processes are dissected and
modules being used in each one of them
are extracted.
If any module matches with a virus
module, the program checks if any port is
being used by that process.
If any port is found , the process may be a
virus .
Detection of running backdoors
Detection of running backdoors
 Hunting for Metamorphic Engines by Wing Wong ,
Mark Stamp
 Hunting for Undetectable Metamorphic Virus by Da
Lin
 Detecting RATs through dynamic analysis using Finite-
State Machines by Gardåsen, Kjetil Tangen
 Remote Administrative Tools : A Comparative Study by
Anis Ismail, Mohammad Hajjar, Haissam Hajjar
 Remote Administrative Trojan/Tool (RAT) by Manjeri N.
Kondalwar , Prof. C.J. Shelke
Detection of running backdoors

More Related Content

PPTX
Pentesting with linux
PPTX
What is mprext.dll?
PPTX
COMPUTER SECURITY AND OPERATING SYSTEM
PPTX
Security & protection in operating system
PPTX
What is BRCLR.DLL?
PPT
OS Security 2009
PPTX
Operating system security
PPT
Presentation on FBI VIRUS
Pentesting with linux
What is mprext.dll?
COMPUTER SECURITY AND OPERATING SYSTEM
Security & protection in operating system
What is BRCLR.DLL?
OS Security 2009
Operating system security
Presentation on FBI VIRUS

What's hot (20)

PPTX
Dickmaster
PPTX
Operating system security
PDF
Persistence in windows
PPTX
What is BFE.DLL?
PPTX
Operating system security
PPTX
Protection and security
PDF
OPERATING SYSTEM SECURITY
PPTX
Security
PPTX
Protection and security of operating system
PDF
PPTX
System security
PPTX
Computer securety
PPTX
BackDoors Seminar
PPTX
Security in Windows operating system
PPT
Op Sy 03 Ch 61a
PPTX
Stuxnet mass weopan of cyber attack
PPTX
PPT
Windows Security in Operating System
Dickmaster
Operating system security
Persistence in windows
What is BFE.DLL?
Operating system security
Protection and security
OPERATING SYSTEM SECURITY
Security
Protection and security of operating system
System security
Computer securety
BackDoors Seminar
Security in Windows operating system
Op Sy 03 Ch 61a
Stuxnet mass weopan of cyber attack
Windows Security in Operating System
Ad

Similar to Detection of running backdoors (20)

PPTX
Trojan virus & backdoors
PPTX
Trojans and backdoors
PPT
Trojan backdoors
PPT
Trojan Backdoors
PDF
Ceh v8 labs module 06 trojans and backdoors
PPT
list of Deception as well as detection techniques for maleware
PPTX
Introduction to Malwares
PPTX
Malicious Software Identification
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
Final malacious softwares
ODP
Computer Viruses & Management Strategies
PDF
Backdoor Entry to a Windows Computer
PPTX
RAT - Kill or Get Killed! by Karan Bansal
PPTX
Harmful software
PDF
Static Detection of Application Backdoors
PPTX
Tools and methods used in cybercrime
PPTX
Introduction to cyber security engineering MODULE 3.pptx
PDF
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
PPTX
Trojan ppt pianca
PDF
Ce hv8 module 06 trojans and backdoors
Trojan virus & backdoors
Trojans and backdoors
Trojan backdoors
Trojan Backdoors
Ceh v8 labs module 06 trojans and backdoors
list of Deception as well as detection techniques for maleware
Introduction to Malwares
Malicious Software Identification
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Final malacious softwares
Computer Viruses & Management Strategies
Backdoor Entry to a Windows Computer
RAT - Kill or Get Killed! by Karan Bansal
Harmful software
Static Detection of Application Backdoors
Tools and methods used in cybercrime
Introduction to cyber security engineering MODULE 3.pptx
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Trojan ppt pianca
Ce hv8 module 06 trojans and backdoors
Ad

Detection of running backdoors

  • 2. A backdoor in a computer system is a method of bypassing normal authentication, securing unauthorized remote access to a computer, while attempting to remain undetected.
  • 3. Backdoor Trojan can be extremely harmful if not dealt with appropriately. The main function of this type of virus is to create a backdoor in order to access a specific system.
  • 4. These backdoors are classified as Trojans if they do not attempt to inject themselves into other files.The backdoor may take the form of an installed program (e.g. Back Orifice) or may subvert the system through a rootkit.
  • 5. Crashing the computer, e.g. with "blue screen of death" (BSOD) Data corruption Electronic money theft Data theft, including confidential files, sometimes for industrial espionage Downloading or uploading of files for various purposes
  • 6. Keystroke logging Downloading and installing software, including third-party malware and ransomware Watching the user's screen Viewing the user's webcam Modifications of registry Linking computer to botnet
  • 7.  Netbus Advance System Care  Subseven or Sub7  Back Orifice (Sir Dystic)  Beast  Zeus  Flashback Trojan (Trojan BackDoor.Flashback)  ZeroAccess  Koobface  Vundo
  • 9. The threat of backdoors surfaced when multiuser and networked operating systems became widely adopted. Harder to detect backdoors involve modifying object code, rather than source code
  • 10. Running processes are dissected and modules being used in each one of them are extracted. If any module matches with a virus module, the program checks if any port is being used by that process. If any port is found , the process may be a virus .
  • 13.  Hunting for Metamorphic Engines by Wing Wong , Mark Stamp  Hunting for Undetectable Metamorphic Virus by Da Lin  Detecting RATs through dynamic analysis using Finite- State Machines by Gardåsen, Kjetil Tangen  Remote Administrative Tools : A Comparative Study by Anis Ismail, Mohammad Hajjar, Haissam Hajjar  Remote Administrative Trojan/Tool (RAT) by Manjeri N. Kondalwar , Prof. C.J. Shelke