02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Malware 199<br />

Tools for Creating Trojans<br />

A wide range of tools exist that are used to take control of a victim’s system and leave<br />

behind a gift in the form of a backdoor. This is not an exhaustive list, and newer versions<br />

of many of these are released regularly:<br />

■ let me rule—A remote access Trojan authored entirely in Delphi. It uses TCP port<br />

26097 by default.<br />

■ RECUB—Remote Encrypted Callback Unix Backdoor (RECUB) borrows its name<br />

from the Unix world. It features RC4 encryption, code injection, and encrypted ICMP<br />

communication requests. It demonstrates a key trait of Trojan software—small size—<br />

as it tips the scale at less than 6 KB.<br />

■ Phatbot—Capable of stealing personal information including e-mail addresses, credit<br />

card numbers, and software licensing codes. It returns this information to the attacker<br />

or requestor using a P2P network. Phatbot can also terminate many antivirus and<br />

software-based firewall products, leaving the victim open to secondary attacks.<br />

■ amitis—Opens TCP port 27551 to give the hacker complete control over the victim’s<br />

computer.<br />

■ Zombam.B—Allows the attacker to use a web browser to infect a computer. It uses<br />

port 80 by default and is created with a Trojan-generation tool known as HTTPRat.<br />

Much like Phatbot, it also attempts to terminate various antivirus and firewall<br />

processes.<br />

■ Beast—Uses a technique known as Data Definition Language (DDL) injection to inject<br />

itself into an existing process, effectively hiding itself from process viewers.<br />

■ Hard-disk killer—A Trojan written to destroy a system’s hard drive. When executed, it<br />

attacks a system’s hard drive and wipes it in just a few seconds.<br />

One tool that should be mentioned as well is Back Orifice, which is an older Trojancreation<br />

tool. Most, if not all, of the antivirus applications in use today should be able to<br />

detect and remove this software.<br />

I thought it would be interesting to look at the text the manufacturer uses to describe its<br />

toolkit. Note that it sounds very much like the way a normal software application from a<br />

major vendor would be described. The manufacturer of Back Orifice says this about Back<br />

Orifice 2000 (BO2K):<br />

Built upon the phenomenal success of Back Orifice released in August<br />

98, BO2K puts network administrators solidly back in control. In control<br />

of the system, network, registry, passwords, file system, and processes.<br />

BO2K is a lot like other major file-synchronization and remote control<br />

packages that are on the market as commercial products. Except that<br />

BO2K is smaller, faster, free, and very, very extensible. With the help of<br />

the open-source development community, BO2K will grow even more<br />

powerful. With new plug-ins and features being added all the time, BO2K<br />

is an obvious choice for the productive network administrator.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!