Advanced Techniques - ubalt.edu

Advanced Techniques - ubalt.edu

Remote Control and Advanced Techniques Remote Control Software What do they do? Connect through dial-in and/or TCP/IP. Replicate remote screen on local machine (graphical) Allow running graphical, text-based application in remote machine, displaying the results in the local machine. A variety of applications, most with free download as demo. pcAnywhere is one of the pioneers and very popular. TCP 5631 and UDP 5632 VNC is very popular because it is cross-platform and free (history, video of hacking VNC and video of Kali Linux Armitage hacking VNC). TCP 5800,5801 , 5900, 5901 (allows alternate ports) . See a free version here. Windows Remote Desktop (you have used it in this course) TCP 3389 and UDP 3389. Discovering and connecting to remote control software

Use Nmap or Superscan to search for ports 22, 799, 800, 1494, 2000, 2001, 5631, 5632, 5800, 5801, 5900, 5901, 43188, 65301, and many others ... Once software is identified download free demo and try brute force. Major weakness: only password is encrypted, traffic is compressed, only. Advanced Techniques Trojans: BO, NetBus and SubSeven and its many variations are the most common Trojan, backdoor hacker tools. TCP/IP ports: official , Internet services. Different from protocol ports. Trojan ports: list , more details, and resources. Port listening software: netstat, TcpView (seen in footprinting tools), BackOfficer Friendly (example). Checking and removing Trojans: F-secure on-line check , Moosoft Cleaner, Avast Trojan tool, Windows Defender. Weeding out rogue processes: Windows Task Manager,

Linux ps aux Be aware of traps: Whack-A-Mole (pseudo game), BoSniffer (BO in disguise), eLiTeWrap (packs Trojans as exe). Generic: download, scan for virus, then execute, do not run from Internet. Rootkits: Difficult to detect Windows 10 secure boot (requires recent hardware) keep a record of your files using Tripwire create image of your hard-drive: hardware (soho) and software solutions (AOMEI Backupper, Drive Image, and others). McAfee RootkitRemover and Sophos Anti-Rootkit. Other Techniques TCP hijacking Juggernaut: spy on a TCP connection and issue commands as the logged user. Hunt: spy on a TCP connection (works with shared and

switched networks). Countermeasures: encrypted protocols such as IPSec, SSH. TFTP: Trivial File Transfer Protocol. Used by routers, and there are free servers for Windows. Available client in Windows : tftp.exe Prevent its use by Nimda (mostly obsolete) or similar: 1) Edit the services file: %systemroot%/system32/drivers/etc/services 2) Find this line: tftp 69/udp 3) Replace it with: tftp 0/udp Social Engineering Help desk information: on the Web, e-mail, voice User information: on the Web, e-mail, voice Social Engineering in Kali Linux (SET): a tutorial.

Recently Viewed Presentations

  • Final Jeopardy Bacteria Protists &  Plants & &

    Final Jeopardy Bacteria Protists & Plants & &

    Any five of the 9 major animal phyla covered in class What are Porifera (Sponges) Cnidarians Platyhelminthes (Flatworms) Nematoda (Roundworms) Annelida Mollusca Arthopoda (insects) Echinoderms Chordates A gametophyte What is a haploid organism? ... The most closely related organisms Common...
  • Alternativa 20.000 30.000 20.000 Inversin Inicial 0  65.000

    Alternativa 20.000 30.000 20.000 Inversin Inicial 0 65.000

    Title: Slide 1 Author ** Last modified by ** Created Date: 5/23/2010 2:36:01 PM Document presentation format: On-screen Show (4:3) Other titles: Arial Calibri MS Pゴシック Office Theme MathType 6.0 Equation Equation Slide 1 Slide 2 Slide 3 Slide 4...
  • Conception transmissive - WordPress.com

    Conception transmissive - WordPress.com

    Différentes approches de l'enseignement et de l'apprentissage Approches transmissive, béhavioriste, gestalstiste, constructiviste et socio-constructiviste pour l'apprentissage et l'enseignement
  • Liquids and Solids - newburyparkhighschool.net

    Liquids and Solids - newburyparkhighschool.net

    Metallic Bonding. Metals are malleable--- they can be bent and reshaped under pressure.. They are also . ductile--- they can be drawn out into a wire. Metals are malleable and ductile because the close-packed layers of positive ions can slide...
  • Functional Language Workshop: Claim Interpretation And Definiteness Under

    Functional Language Workshop: Claim Interpretation And Definiteness Under

    As shown in the three figures reproduced on this slide, the side panel 15 extends from cut line 20 to cut line 21, and is hinged to provide access to the storage box 23. The hinges are located on the...
  • Development of the Parental Needs Scale (PNS:RD)  A

    Development of the Parental Needs Scale (PNS:RD) A

    The definition of a rare disease differs between countries. The most commonly used definition for rare diseases is based on European legislation which defines a rare disease as one with a prevalence estimate no more than 1 in 2,000 people...
  •   www.ucl.ac.uk   Join us! study@ucl.ac.uk Twitter: @UCL Instagram:@UCL Reconnect

    www.ucl.ac.uk Join us! [email protected] Twitter: @UCL Instagram:@UCL Reconnect

    <insert topic> <insert speaker's name>. www.ucl.ac.uk. Done. Introduce yourself very briefly. Your name. Your job title - and what that means you might do on a daily basis. What UCL means to you
  • Chapter 15 - Dynamic HTML: Filters and Transitions

    Chapter 15 - Dynamic HTML: Filters and Transitions

    Chapter 15 - Dynamic HTML: Filters and Transitions Outline 15.1 Introduction 15.2 Flip Filters: flipv and fliph 15.3 Transparency with the chroma Filter 15.4 Creating Image masks 15.5 Miscellaneous Image Filters: invert, gray and xray 15.6 Adding shadows to Text...