{"id":411,"date":"2010-03-10T21:00:00","date_gmt":"2010-03-10T13:00:00","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=411"},"modified":"2024-02-17T20:33:25","modified_gmt":"2024-02-17T12:33:25","slug":"trojan-and-backdoor","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/411","title":{"rendered":"trojan and backdoor"},"content":{"rendered":"\n<p><strong>trojan<\/strong><br>Malicious code masquerading as or replacing legitimate code<br>A Trojan Horse is an apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation,falsification, or destruction of data<\/p>\n\n\n\n<p>overt and covert channels<br><strong>overt channel(\u5408\u6cd5\u901a\u9053)<\/strong>:a legitimate communicatin path within a computer system,or network,for the transfer of data<br><strong>covert channel(\u96b1\u5bc6\u6027\u901a\u9053)<\/strong>:a channel that transfers information within a computer system,or network,in a way that violates the security policy<br>ex:trojan\u6703\u4f7f\u7528covert channel\u4f86\u9003\u907f\u5b89\u5168\u8edf\u9ad4\u7684\u5075\u6e2c<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>types of trojans :<\/strong><br>remote access trojans<br>data-sending trojans<br>destructive trojans<br>DOS attack trojans<br>proxy trojans<br>ftp trojans<br>security software disablers<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>different ways a trojan can get into a system:<\/strong><br>IM applications<br>IRC<br>via attachments<br>physical access<br>browser and email software bugs<br>netbios<br>fake programs<br>suspicious sites and freeware software<br>downloading files,games,and screensavers from internet sites<br>legitimate &#8220;shrink-wrapped&#8221; softward packaged by a diagruntled employee<\/p>\n\n\n\n<p>ps:<br>\u81ea\u52d5\u57f7\u884c<br>\u5c07\u4ee5\u4e0b\u653e\u5165autorun.inf<br>[autorun]<br>open=setup.exe<br>icon=setup.exe<\/p>\n\n\n\n<p>ps:<br>\u6bcf\u6b21\u958b\u6a5f\u6642\u90fd\u57f7\u884c<br>\u5728\u4ee5\u4e0b\u6a5f\u78bc\u5167\u65b0\u589e\u9805\u76ee<br>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\Services<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>indications of trojan attack<\/strong><br>\u96fb\u8166\u8b8a\u6162,\u7570\u5e38\u7684\u5927\u91cf\u8b80\u53d6<br>\u51fa\u73fe\u7570\u5e38\u7db2\u8def\u6d41\u91cf\u8207\u9023\u7dda<br>cd-rom\u6703\u81ea\u5df1\u958b<br>\u87a2\u5e55\u4e0a\u4e0b\u5d6e\u5012<br>\u6ed1\u9f20\u81ea\u52d5\u79fb\u5230\u53f3\u4e0a\u89d2\u6309close<\/p>\n\n\n\n<p>ps:hijacklist, \u53ef\u5075\u6e2c\u662f\u5426\u6709\u7570\u5e38\u7a0b\u5f0f<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>ports used by trojans<\/strong><br>back orifice:udp 31337 or 31338<br>deep throat:udp 2140 and 3150<br>netbus:tcp 12345 and 12346<br>whack-a-mole:tcp 12361 and 12362<br>netbus2:tcp 20034<br>grilfriend:tcp 21544<br>sockets de troie:tcp 5000,5001 or 50505<br>masters paradise:tcp 3129,40421,40422,40423,and 40426<br>devil:tcp 65000<br>evil:ftp 23456<br>doly trojan:tcp 1011,1012,1015<br>chargen:udp 9,19<br>stealth spy phaze:tcp 555<br>netbios datagram:tcp,udp 138<br>sub seven:tcp 6711,6712,6713<br>icq trojan:tcp 1033<br>mstream:udp 9325<br>the prayer 1\/2:tcp 9999<br>online keylogger:udp 49301<br>portal of doom:tcp,udp 10067,10167<br>senna spy:tcp 13000<br>trojan cow:tcp 2001<\/p>\n\n\n\n<p>ps:netstat -an\u53ef\u770bport state<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>\u7d93\u5178\u7684trojan<\/strong><br>tini:a simple and small(3kb) backdoor for windows,it listens at tcp port 777<br>icmd:\u53efmultiple connections,\u53ef\u8a2dpassword<br>netbus: \u65e9\u671f\u6709\u540d\u7684\u6728\u99ac,\u5728\u65e9\u671f\u7b97\u662f\u529f\u80fd\u9f4a\u5168,\u53ef\u958bcdrom,\u8b80\u53d6\u7cfb\u7d71\u6a94,&#8230;\u7b49<br>netcat:\u7db2\u7ba1\u5de5\u5177,\u6709backdoor\u529f\u80fd<br>cryptcat:netcat + encryption<br>beast:\u4e3b\u8981\u662f\u505a\u9060\u7aef\u7ba1\u7406,\u6b64tool\u6703\u7522\u751fserver\u7aef(\u6728\u99ac)\u548c\u7ba1\u7406\u7aef<br>mosucker: \u63a7\u7ba1\u529f\u80fd\u4e0d\u932f<br>sars:\u53d7\u5bb3\u8005\u6703\u628aip\u50b3\u7d66\u653b\u64ca\u8005<br>proxy server trojan:\u5c0f\u578bproxy(3kb),\u653e\u5728\u4efb\u4e00\u53f0\u96fb\u8166\u4e0a\u7576\u8df3\u677f,\u8b93\u653b\u64ca\u8005\u4e0a\u7db2<br>tinyftpd:\u5728\u53d7\u5bb3\u7aef\u958bftp\u8b93\u653b\u64ca\u8005\u9023\u7dda<br>vnc trojan:\u9060\u7aef\u63a7\u7ba1\u8edf\u9ad4<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>wrapper<\/strong><br>A tool used to bind the Trojan with legitimate file<br>\u5c07\u6728\u99ac\u8207\u6b63\u5e38\u7a0b\u5f0f\u5408\u5728\u4e00\u8d77<\/p>\n\n\n\n<p>wrapper tool\u6709\u4ee5\u4e0b<br>one file exe maker:\u5c072\u500b\u7a0b\u5f0f\u5408\u4f75<br>yet another binder<br>pretator wrapper<\/p>\n\n\n\n<p>\u5176\u4ed6tool\u6709\u4ee5\u4e0b<br>wordpad<br>remotebymail:\u4f7f\u7528mail\u4f86\u63a7\u5236<br>icon plus:\u6539\u8b8a\u7a0b\u5f0ficon<br>restorator:defacing application<br>tetris<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><strong>http tunnel<\/strong><br>\u4e00\u7a2e\u96b1\u85cf\u901a\u8a0a\u7684\u6280\u8853<br>\u5e38\u898btool\u6709\u4ee5\u4e0b<br>http rat:http trojan,<br>shttpd trojan:http trojan<\/p>\n\n\n\n<p>ps:<br>atelier web remote commander<br>badluck destructive trojan:a dangerous and destructive tool,\u57f7\u884c\u5f8c\u5c07\u7834\u58de\u4f5c\u696d\u7cfb\u7d71<br>trojan horse construction kit:\u6728\u99ac\u7522\u751f\u5668,\u6839\u64da\u9078\u64c7\u7522\u751f\u4e0d\u540c\u7684\u6728\u99ac<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>icmp tunneling<\/strong><br>\u4e00\u7a2e\u96b1\u85cf\u901a\u8a0a\u7684\u6280\u8853<br>use icmp echo-request and echo-reply<\/p>\n\n\n\n<p>icmp backdoor trojan<br>loki:\u4f7f\u7528icmp,\u96e3\u4ee5\u88ab\u5075\u6e2c<\/p>\n\n\n\n<p>ps<br>loki countermeasures<br>1external icmp_echo traffic should be disabled completely<br>2this does have serious implications to normal network management,since it affects network communication management within the local segment.this is configured to permit internal ping traffic and block and disable the packets coming from outiside<br>3disable icmp_echo_reply traffic on a cisco router,security implications make this a prudent choice<br>4ensure that the routers are configured not to send icmp_unreachable error packets to hosts that do not respond to arps<br>ps:<br>loki also has the option to run over udp port 53<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>reverse connecting trojans<\/strong><br>\u53ef\u53cd\u9023\u7684\u6728\u99ac<br>\u4e2d\u6728\u99ac\u53d7\u5bb3\u8005\u6703\u9023\u5230\u653b\u64ca\u8005\u6307\u5b9aport,\u7cfb\u7d71\u5224\u65b7\u53ef\u80fd\u6b63\u5e38,\u56e0\u70ba\u662f\u7531\u4f7f\u7528\u8005\u767c\u51fa<br>tool\u6709\u4ee5\u4e0b<br>nuclear rat trojan<br>CCTT(covert channel tunneling tool)<br>windows reverse shell<br>perl-reverse-shell<br>winarp_mim:\u4f7f\u7528arp \u653b\u64ca\u7684\u5c0f\u6728\u99ac<\/p>\n\n\n\n<p><strong>XSS tunneling<\/strong><br>\u5728\u7db2\u9801\u63d2\u4e00\u6bb5SCRIPT,\u53d7\u5bb3\u8005\u700f\u89bd\u7db2\u9801\u6642\u6703\u88ab\u653b\u64ca\u8005\u63a7\u5236<br>tool\u6709:<br>xss shell tunnel:web\u4ecb\u9762<br>xss tunnel:\u4f7f\u7528.net framework<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><br><strong>miscellaneous trojans:<\/strong><br>backdoor.theef<br>t2w<br>downtroj<br>turkojan<br>trojan.satellite-rat<br>yakoza<br>trojan.hav-rat<br>PI(poison ivy):\u4e3b\u8981\u7528\u505a\u9060\u7aef\u7ba1\u7406,\u53ef\u53cd\u9023,\u591a\u529f\u80fd,\u6709plug-in,\u4e14\u4fee\u6539\u5f8c\u5f88\u96e3\u88ab\u5075\u6e2c\u5230<br>rapid hacker<br>shark<br>hackerzrat<br>optix pro<br>proagent<br>od client<br>acerat<br>mhacker-ps<br>rubyrat public<br>consoledevil<br>zombierat<br>webcam trojan:\u5c08\u9580\u63a7\u5236webcam<br>dji rat<br>skiddie rat<br>biohazard rat<br>troya<br>prorat<br>dark girl<br>dacryptic<br>net-devil<br>pokerstealer.a<br>hovdy.a<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><br>\u5075\u6e2ctrojans<br>1<br><strong>scan for suspicious open open ports<\/strong><br>\u53ef\u7528tool<br>netstat<br>fport<br>tcpview<br>currports<\/p>\n\n\n\n<p>2<br><strong>scan for suspicious running processes<\/strong><br>\u53ef\u7528tool\u6709<br>process viewer\/process explorer<br>what&#8217;s on my computer<br>super system helper<br>inzider<br>what&#8217;s running<\/p>\n\n\n\n<p>3<br><strong>scan for suspicious registry entries<\/strong><br>\u53ef\u7528 tool:<br>msconfig<br>autoruns<br>hijack this:\u53ef\u5206\u6790\u958b\u6a5f\u904e\u7a0b,\u4e26\u5c07\u8a18\u9304\u4e0a\u50b3\u505a\u5206\u6790<br>startup list<\/p>\n\n\n\n<p>4<br><strong>scan for suspicious network activities<\/strong><br>\u53ef\u7528 tool:ethereal<\/p>\n\n\n\n<p>5<br><strong>run trojan scanner to detect trojans<\/strong><br>\u5e38\u898banti-trojan\u8edf\u9ad4\u6709<br>trojan hunter<br>comodo boclean<br>xsoftspyse<br>spyware doctor<br>spywarefighter<\/p>\n\n\n\n<p>\u5176\u4ed6\u9084\u6709<br>trojan guard<br>zonealarm-f<br>winpatrol<br>leaktest<br>kerio personal firewall<br>sub-net<br>tavscan<br>spybot search &amp; destroy<br>anti trojan<br>cleaner<br>vba32:\u812b\u6bbc\u80fd\u529b\u5f37<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<p><strong>\u9003\u907fanti-virus\u6280\u8853<\/strong><br>never use trojans from the wild<br>write your own trojan and embed it into an application<br>change trojan&#8217;s syntax ,ex:convert an exe to doc file<br>change the checksum<br>change the content of the trojan using hex editor<br>break the trojan file into multiple pieces<\/p>\n\n\n\n<p>\u9003\u907fanti-trojan\/anti-virus tool:<br>stealth tools<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><br><strong>countermeasures<\/strong><br>educate users not to install applications downloaded from the internet and email attachments<\/p>\n\n\n\n<p>use tool:<br>tripwire<br>sigverif.exe:system file verification<br>sfc.exe:system file checker<br>md5sum.exe<br>windows defender<\/p>\n","protected":false},"excerpt":{"rendered":"<p>trojanMalicious code masquerad &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[39],"tags":[],"class_list":["post-411","post","type-post","status-publish","format-standard","hentry","category-concept"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=411"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/411\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}