Trojans and Backdoors Response

profileislandbuilt

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.


RESPONSE 1:


Hello everyone,


There are a variety of different forms and versions of Trojan malware and sniffers. For this situation the end goal is the access of sensitive data. The attack would be to smuggle a specific sniffer that will capture data in some way by using Trojan malware. The Trojan could take on a number of forms to be executed on the victim’s computer. It needs to infect and be attached to a legitimate file of some kind. It could be an email with an executable file or some kind of download. It just has to look like something completely innocent and trustworthy. Once it is executed, the Trojan releases its payload. In this instance the payload will be address resolution protocol (ARP) poisoning. This sniffer proceeds to poison the ARP cache of hosts on the network causing network traffic to be directed to the hacker (Baltazar, 2006).


The flaw hypothesis methodology for the hacker starts within an examination and brainstorming on paper, if you will, of a series of potential vulnerabilities in the target system. These areas of examination include past flaws in similar systems, unclear design, circumvention of security controls, incompleteness in designs and policies, any deviation from recommended policy norms, special precautions and system anomalies, and operational and developmental practices and prohibitions ( Weissman, 1995). Once a plan is produced, the penetration hack commences.


Jaron


Baltazar, J. (2006, August 25). Trojan Uses ARP Poisoning. Retrieved July 30, 2020, from https://blog.trendmicro.com/trendlabs-security-intelligence/trojan-uses-arp-poisoning/


Weissman, C. (1995, January 24). SECURITY PENETRATION TESTING GUIDELINE: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems [PDF]. NRL Technical Memorandum.


RESPONSE 2:


Hello Class,


I hope everyone is having a great week! This week we are discussing how a malicious user would use a trojan with a sniffer to access sensitive data. A sniffer can obtain network traffic as it goes across the network. That is not all, according to Sean -Philip Oriyano “a sniffer can give an attacker access to a large amount of information, including e-mail passwords, Web passwords, File Transfer Protocol (FTP) credentials, e-mail contents, and transferred files” (Oriyano, (2013). A good example of a sniffer is Wireshark or even Tcpdump which is not so surprising. So, we all have pretty much used a sniffer in this class. Additionally, a malicious user being able to effectively use a sniffer could have dangerous outcomes.


A trojan is a virus that allows one to do a few things, but what I have been looking at in particular is backdoors. If a trojan opens a backdoor into your computer, they will be able to access the computer and control it. According to Webroot.com, “Backdoor Trojans will allow hackers to remotely access and control a computer, often for the purpose of uploading, downloading, or executing files at will” (N/A, (2020). This type of virus is truly scary, and one idea that comes to my mind, is a malicious user getting a person’s personal information and baiting them into clicking onto an email to open a backdoor. If a person has someone’s personal information, they could most certainly trick them into downloading something, especially if the attacker is studying the user, or has access to any of their personal accounts. Using a trojan and a sniffer at the same time could definitely cause a lot of problems for someone.


An attacker using the Flaw Hypothesis Methodology could use it to attempt or gain ground into a system. They would gather specific information, make them a list of vulnerabilities, test them out, and potentially find more access points like it (Bishop, (2004).  


-John


Reference(s)


Bishop, Matt. (2004). Chapter 20: Vulnerability Analysis. Retrieved from http://nob.cs.ucdavis.edu/book/book-intro/slides/20.pdf


N/A. (2020). What is a Trojan Virus? Retrieved from https://www.webroot.com/us/en/resources/tips-articles/what-is-trojan-virus


Oriyano, S. (2013). Hacker Techniques, Tools, and Incident Handling. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/9781284047455/


    • 14 days ago
    • 10
    Answer(1)

    Purchase the answer to view it

    NOT RATED
    • attachment
      order_143182_380439.docx
    Bids(99)