19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.21 Trojan horses<br />

A Trojan horse is a program with a hidden, undocumented function or effect.<br />

<strong>The</strong> user therefore has no influence on the execution of that function, making<br />

its effect similar to that of a computer virus. However, unlike computer<br />

viruses, Trojan horses are not self-reproductive. Any kind of application<br />

software can be used as carrier for a Trojan horse. Script languages, like batch<br />

files, ANSI control sequences, Postscript etc., which are interpreted by the<br />

operating system or by an application program, can also have Trojan horses<br />

planted in them.<br />

<strong>The</strong> more privileges the originator program has, the more damage the Trojan<br />

horse can cause.<br />

Examples<br />

- A modified login program can contain a Trojan horse which sends the<br />

user's user name and password to an aggressor over the network and then<br />

passes it to the correct log-in program. Such Trojan horses have appeared<br />

recently on several online services like AOL or T-Online.<br />

- <strong>The</strong> Back Orifice program is a client/server application which enables the<br />

client to maintain a Windows PC remotely over the network. In particular,<br />

it is possible for data to be read and written and also for programs to be<br />

executed. <strong>The</strong>re is a risk that this program could be integrated into another<br />

application program and thus used as a Trojan horse. If the Trojan horse<br />

starts up when there is a network connection, then an adversary can use the<br />

remote maintenance function of Back Orifice to gain access to the user's<br />

PC unnoticed. <strong>The</strong> NetBUS program, which has similar functions, should<br />

also be mentioned here.<br />

- It is possible using root kits for different UNIX variants which contain<br />

manipulated versions of the programs ps, who, netstat etc. to keep so-called<br />

back doors open for prolonged periods, allowing penetration of the system<br />

to go unnoticed so that traces of the attack are covered up. Often the files<br />

/sbin/in.telnetd, /bin/login, /bin/ps, /bin/who, /bin/netstat and the C<br />

Libraries are replaced in this way.<br />

- Another source of danger in UNIX systems is the "." in the $PATH<br />

environment variable. If the current working directory (.) is included as a<br />

path in the PATH variable, the programs located there are executed first.<br />

Thus, while listing of the contents of a directory the superuser could<br />

unintentionally execute a modified "ls" program with root rights contained<br />

there.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Application programs<br />

and script languages<br />

Altered login programs<br />

Back Orifice and NetBUS<br />

Manipulated programs<br />

and libraries<br />

Current directory in the<br />

search path

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!