Backdoors and remote access tools
This presentation is the property of its rightful owner.
Sponsored Links
1 / 18

Backdoors and Remote Access Tools PowerPoint PPT Presentation


  • 99 Views
  • Uploaded on
  • Presentation posted in: General

Backdoors and Remote Access Tools. INSA Laboratory. Introduction. The goal is to control remotely. Outline. Windows VNC NetBus Pro BO Sub7 Linux STCPSHELL. VNC. Simple Remote Assess Tool Desktop http://www.realvnc.com/. Setup VNC Server. Connect to VNC Server. NetBus Pro.

Download Presentation

Backdoors and Remote Access Tools

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Backdoors and Remote Access Tools

INSA Laboratory


Introduction

  • The goal is to control remotely


Outline

  • Windows

    • VNC

    • NetBus Pro

    • BO

    • Sub7

  • Linux

    • STCPSHELL


VNC

  • Simple Remote Assess Tool

  • Desktop

  • http://www.realvnc.com/


Setup VNC Server


Connect to VNC Server


NetBus Pro

  • Allow full control

  • It isn’t as graphically friendly asVNC

  • http://www.packetstormsecurity.org


Setup NetBus Server


Double Click


Back Orifice

  • More functions

  • Support plug-ins

  • http://www.bo2k.com/


Setup BO Server


Setup Client


Connect to Victim


SubSeven

  • Sub7 is similar to BO2k and Netbus

  • More convenient

    • Just execute file

  • http://www.hackpr.net/~sub7/downloads.html


Setup Sub7 Server


Connect to Victim


SCTPSHELL

  • Server

  • IP Spoofing

  • Client

  • Create a virtual shell on victim’s computer

  • Spoof TCP packets

  • http://www.pkcrew.org/tools/stcpshell.c

Client

140.123.113.72

Server

140.123.113.93


Summary


  • Login