02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Malware 201<br />

5. In the next screen, enter a password that will be used to access the server. Note that<br />

passwords can be used, but you can also choose open authentication—that means anyone<br />

can gain access without having to supply credentials of any kind.<br />

6. When the wizard finishes, the server-configuration tool is provided with the information<br />

you entered.<br />

7. The server can be configured to start when the system starts up. This allows the program<br />

to restart every time the system is rebooted, preventing the program from becoming<br />

unavailable.<br />

8. Click Save Server to save the changes and commit them to the server.<br />

Once the server is configured, it is ready to be installed on the victim’s system.<br />

No matter how the installation is to take place, the only application that needs to be run<br />

on the target system is the BO2K executable. After this application has run, the previously<br />

configured port is open on the victim’s system and ready to accept input from the attacker.<br />

The application also runs an executable file called Umgr32.exe and places it in the<br />

Windows system32 folder. Additionally, if you configure the BO2K executable to run<br />

in stealth mode, it does not show up in Task Manager—it modifies an existing running<br />

process to act as its cover. If stealth was not configured, the application appears as a<br />

Remote Administration Service.<br />

The attacker now has a foothold on the victim’s system.<br />

Distributing Trojans<br />

Once a Trojan has been created, you must address how to get it onto a victim’s system. For<br />

this step, many options are available, including tools known as wrappers.<br />

Using Wrappers to Install Trojans<br />

Using wrappers, attackers can take their intended payload and merge it with a harmless<br />

executable to create a single executable from the two. Some more advanced wrapper-style<br />

programs can even bind together several applications rather than just two. At this point,<br />

the new executable can be posted in a location where it is likely to be downloaded.<br />

Consider a situation in which a would-be attacker downloads an authentic application<br />

from a vendor’s website and uses wrappers to merge a Trojan (BO2K) into the application<br />

before posting it on a newsgroup or other location. What looks harmless to the downloader<br />

is actually a bomb waiting to go off on the system. When the victim runs the infected<br />

software, the infector installs and takes over the system.<br />

Some of the better-known wrapper programs are the following:<br />

■ EliteWrap is one of the most popular wrapping tools, due to its rich feature set that<br />

includes the ability to perform redundancy checks on merged files to make sure<br />

the process went properly and the ability to check if the software will install as<br />

expected. The software can be configured to the point of letting the attacker choose<br />

an installation directory for the payload. Software wrapped with EliteWrap can be<br />

configured to install silently without any user interaction.<br />

■ Saran Wrap is specifically designed to work with and hide Back Orifice. It can bundle<br />

Back Orifice with an existing program into what appears to be a standard program<br />

using Install Shield.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!