1 / 11

CSE 4273/6273

CSE 4273/6273. Hostile Code October 31, 2005. Hostile Code. Can be any code not specifically authorized by the system administrator. Much as a burglar’s tools, possessing a hacker’s tools can also be criminal.

gracie
Download Presentation

CSE 4273/6273

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CSE 4273/6273 Hostile Code October 31, 2005

  2. Hostile Code • Can be any code not specifically authorized by the system administrator. • Much as a burglar’s tools, possessing a hacker’s tools can also be criminal. • Any software that is designed to give one power over another can be hostile, if used in a hostile way.

  3. Categories of Hostile Code • Manual • Autonomous • Internally directed • Externally directed

  4. Categories (continued)

  5. Ways That Hostile Code Can Be Used • Remote Access • Data Gathering • Sabotage • Denial-of-Service • Eluding Detection • Resource Theft • Circumvention of access control • Social Status • Self-fulfillment

  6. Windows Malware • NetBus • Back Orifice • Similar to PC Anywhere

  7. Hostile Info-gathering Software

  8. Application-Specific Sniffers

  9. Distributed Denial of Service Attack Slave Attacker Master Slave Victim Slave

  10. Other Types of Hostile Code • Bombs • Logic Bombs • Time Bombs • Pager Bombs • Mail Bombs • Hiding the Tracks • Deleting log files • Trojan Horses • Files that are trojanized

  11. Continued… • Trojan Horses • Files that are trojanized • Access Exploits • Vulnerability Scanners

More Related