Backdoor

94-barksandbytesgraphics-march-ghostmalware

“To know your enemy, You must become your enemy”

-Sun Tzu

Background of Backdoors

BACKDOORS are not always bad. They can be very useful in finding security flaws.  Because auditors sometimes request backdoors in production programs so that they can insert fictitious but identifiable transactions into system, and trace the flow of these transactions through the system. However, backdoors must be documented, access to them must be strong controlled, and they should be used only with full understanding of the potential consequences.

From the overview this tread presence was not noticed because it surfaced when multiuser and network operating system became widely adopted in the world. These threads create registry entry that automatically runs every time Windows start.  Examples of BACKDOORS

  1. Win32/Vawtrak.A
  2. xp_cmdshell
  3. uvfuvwog
  4. wthejcy
  5. xausgo
  6. zlbgqk
  7. degwbxm
  8. dqxcovwm
  9. ejrtzpaz
  10. fvvifvwz
  11. iopwark

What is Backdoor?

Backdoors or trapdoor is a secret door entry point into a program that can give hacker to access user personal computer and can also steal user personal information such as names, address, account number and password for banking website or company documents.

Hackers will continue an unethical programmer and exploit backdoors easily without leaving any traces in the system.Backdoors also allows the hackers to remotely access to computer and Backdoors are often used for targeted attack such as kingdoms, company, prime ministry and businesses.

Backdoors or trapdoor is a secret door entry point into a program that can give hacker to access user personal computer and can also steal user personal information such as names, address, account number and password for banking website or company documents. Hackers will continue an unethical programmer and exploit backdoors easily without leaving any traces in the system.Backdoors also allows the hackers to remotely access to computer and Backdoors are often used for targeted attack such as kingdoms, company, prime ministry and businesses.

Function/Characeristic of Backdoor

Backdoors or trapdoor is a secret door entry point into a program that can give hacker to access user personal computer and can also steal user personal information such as names, address, account number and password for banking website or company documents.

Hackers will continue an unethical programmer and exploit backdoors easily without leaving any traces in the system.

Backdoors also allows the hackers to remotely access to computer and Backdoors are often used for targeted attack such as kingdoms, company, prime ministry and businesses.

  • Once the backdoor is open the programmer can access into the program once it is placed into production.

 

Why Backdoors attack?

The biggest threat of computer security are human factor because human comes in with many different behavior and emotional person also in different situation. There are few human factors that can become a serious problem if the malware not resolve properly by the user. The factors are prompted by money, fame, emotional jealousy and dissatisfaction.

In new era globalization now usually some human abuses a computer security for their benefits. Therefore malicious activity is ongoing by the human itself. It can be dangerous issues for cyber networking.The way of backdoors is always opened without using the required password that can easily to hackers do immoral ethics.

How Backdoors attack?

Because our computing system is too complex structure, programmers usually develop and test system in modular manner. Each small component of the system is tested by programmers (hacker’). Then components are grouped into logical clusters of a few components and each cluster is tested by individually.

Each component is initially test without all surrounding routines that prepare input or work with output. To test a single module it may be necessary to write stubs and drivers, simple routines to inject data into and extract result from the routines being tested.

During program testing, flaws may be discovered in modules. Sometimes, when the source of the flaw is not obvious, debugging code is inserted into suspicious modules, causing these modules to display intermediate results of computation or to perform extra computations to check the validity of previous modules.

Command insertion is a recognized testing practice. If left in place after testing, the extra command can become a problem. They are undocumented control sequences that produce side effects and can be used as backdoors/trapsdoors. In fact, a debugging backdoors in an electronic mail program was one way the Internet worm be spread its infection.

Error checking is another source of backdoors. Is some poorly designed systems, unacceptable input may not be caught and may be accepted.

Another common example of this kind of flaw can be found in hardware processor design, where not all possible binary opcode values have matching machine instructions. The undefined opcode sometimes implement peculiar instructions, eithers for testing the design of the processor or due to an oversight by the designer of the processor. This is the hardware counterpart of the software flaw described.

Factor of backdoor attack

The biggest threat of computer security are human factor because human comes in with many different behavior and emotional person also in different situation. There are few human factors that can become a serious problem if the malware not resolve properly by the user. The factors are prompted by money, fame, emotional jealousy and dissatisfaction.

In new era globalization now usually some human abuses a computer security for their benefits. Therefore malicious activity is ongoing by the human itself. It can be dangerous issues for cyber networking.

The way of backdoors is always opened without using the required password that can easily to hackers do immoral ethics.

  • Today’s attackers are far more sophisticated because they desperate want to be famous in the hacker’s worlds. They are also wanted to impose their political beliefs or systems on others. They been never think about what will become after they make this immoral behavior. Soon, our juvenile now will follow their behavior then become more dangerous among the people. Attackers are angry and they want to exact revenge on those who have angered them.
  • Another cause these tread become spreads into networking world are the programmer usually forgets to remove the backdoor in their system in production programs. Next, programmer intentionally leaves backdoors in the program for testing and maintenance of the finished program .

How to trace Backdoors?

We can trace the malicious hackers by using backdoor once they log your keystrokes and some of your data being delete automatically. Other than that, we can know this malware in our pc system by start and stop processes like IE, Firefox, Outlook, Windows Explorer, Command prompt and Task Manager. Because the hacker used backdoors to changes Firefox settings for prevents used to traces them.

MALICIOUS HACKERS CAN DO IF THEY ALREADY CONNECTED.

  1. They can take a screenshot of personal data victim in their PC.
  2. They also can find what processes are running in users PC.
  3. Delete files and steal information of company.
  4. Spread the virus to troubles victim.

REFERENCE

  1. Slide computer security-chapter 2 (attacks and thread)
  2. https://en.wikipedia.org/wiki/Backdoor_(computing)
  3. https://www.owasp.org/images/a/ae/OWASP_10_Most_Common_Backdoors.pdf
  4. https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Backdoor:Win32/Vawtrak.A
Advertisements