Page 104 - StudyBook.pdf
P. 104

88     Chapter 2 • General Security Concepts: Attacks



              TEST DAY TIP
                  While it isn’t necessary to have installed backdoor or virus software on a
                  test machine in order to pass this exam, it can be useful in gaining a
                  greater understanding of the concept. Reading about a topic is one
                  thing, but seeing it running in the wild is another. Hands-on experience
                  can make the concepts seem more tangible, while giving insight into
                  not just what malware is, but how it actually works. The added famil-
                  iarity can ease nerves on the test day. However, be sure you get this
                  hands-on experience in a controlled test environment; do not install
                  these programs on machines that are connected to a production net-
                  work or the Internet. Even better, try using a virtual machine.




                 A backdoor attack that was common some years ago was Back Orifice. It con-
             sists of a client application and a server application.The only way for the server
             application of Back Orifice to be installed on a machine is for it to be deliberately
             installed.This is the reason this server application is commonly disguised via a
             Trojan horse.After the server application has been installed, the client machine can
             transfer files to and from the target machine, execute an application on the target
             machine, restart or lock up the target machine, and log keystrokes from the target
             machine.All of these operations are of value to a hacker.The original Back Orifice
             only worked in Windows 95 and 98, while Back Orifice 2000 (BO2k) also runs on
             Windows 2000, ME and XP. Even if a machine is infected, a properly configured
             firewall prevents the client application from connecting to the victim.
                 Another common remote control Trojan horse was named the SubSeven Trojan.
             Sent within a software called Whack-a-Mole, after execution it displayed a cus-
             tomized message to mislead the victim. SubSeven allowed the attacker to have
             nearly full control of the victim’s computer with the ability to delete folders and/or
             files, taking screen shots of the current desktop, control the mouse point, sniff
             traffic off the victim’s network, and even eavesdrop through the victim computer’s
             microphone. It can run on Windows NT, 9x, 2000, and XP.



              EXAM WARNING

                  While the concepts behind worms, viruses, spyware, rootkits, logic
                  bombs, and Trojan horses are very similar, it’s important to be sure you
                  can quickly differentiate. There is often a fine line between a virus and
                  a worm, so be sure to know the specific differences between them.



          www.syngress.com
   99   100   101   102   103   104   105   106   107   108   109