18
Backdoors and Remote Access Tools Roy INSA Laboratory

Backdoors and Remote Access Tools Roy INSA Laboratory

  • View
    216

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Backdoors and Remote Access Tools Roy INSA Laboratory

Backdoors and Remote Access Tools

Roy

INSA Laboratory

Page 2: Backdoors and Remote Access Tools Roy INSA Laboratory

Introduction

• The goal is to control remotely

Page 3: Backdoors and Remote Access Tools Roy INSA Laboratory

Outline

• Windows– VNC– NetBus Pro– BO– Sub7

• Linux– STCPSHELL

Page 4: Backdoors and Remote Access Tools Roy INSA Laboratory

VNC

• Simple Remote Assess Tool

• Desktop

• http://www.realvnc.com/

Page 5: Backdoors and Remote Access Tools Roy INSA Laboratory

Setup VNC Server

Page 6: Backdoors and Remote Access Tools Roy INSA Laboratory

Connect to VNC Server

Page 7: Backdoors and Remote Access Tools Roy INSA Laboratory

NetBus Pro

• Allow full control

• It isn’t as graphically friendly asVNC

• http://www.packetstormsecurity.org

Page 8: Backdoors and Remote Access Tools Roy INSA Laboratory

Setup NetBus Server

Page 9: Backdoors and Remote Access Tools Roy INSA Laboratory

Double Click

Page 10: Backdoors and Remote Access Tools Roy INSA Laboratory

Back Orifice

• More functions

• Support plug-ins

• http://www.bo2k.com/

Page 11: Backdoors and Remote Access Tools Roy INSA Laboratory

Setup BO Server

Page 12: Backdoors and Remote Access Tools Roy INSA Laboratory

Setup Client

Page 13: Backdoors and Remote Access Tools Roy INSA Laboratory

Connect to Victim

Page 14: Backdoors and Remote Access Tools Roy INSA Laboratory

SubSeven

• Sub7 is similar to BO2k and Netbus

• More convenient– Just execute file

• http://www.hackpr.net/~sub7/downloads.html

Page 15: Backdoors and Remote Access Tools Roy INSA Laboratory

Setup Sub7 Server

Page 16: Backdoors and Remote Access Tools Roy INSA Laboratory

Connect to Victim

Page 17: Backdoors and Remote Access Tools Roy INSA Laboratory

SCTPSHELL

• Create a virtual shell on victim’s computer

• Spoof TCP packets

• http://www.pkcrew.org/tools/stcpshell.c

• Server• IP Spoofing• Client

Client

140.123.113.72

Server

140.123.113.93

Page 18: Backdoors and Remote Access Tools Roy INSA Laboratory

Summary