110 likes | 245 Views
CSE 4273/6273. Hostile Code October 31, 2005. Hostile Code. Can be any code not specifically authorized by the system administrator. Much as a burglar’s tools, possessing a hacker’s tools can also be criminal.
E N D
CSE 4273/6273 Hostile Code October 31, 2005
Hostile Code • Can be any code not specifically authorized by the system administrator. • Much as a burglar’s tools, possessing a hacker’s tools can also be criminal. • Any software that is designed to give one power over another can be hostile, if used in a hostile way.
Categories of Hostile Code • Manual • Autonomous • Internally directed • Externally directed
Ways That Hostile Code Can Be Used • Remote Access • Data Gathering • Sabotage • Denial-of-Service • Eluding Detection • Resource Theft • Circumvention of access control • Social Status • Self-fulfillment
Windows Malware • NetBus • Back Orifice • Similar to PC Anywhere
Distributed Denial of Service Attack Slave Attacker Master Slave Victim Slave
Other Types of Hostile Code • Bombs • Logic Bombs • Time Bombs • Pager Bombs • Mail Bombs • Hiding the Tracks • Deleting log files • Trojan Horses • Files that are trojanized
Continued… • Trojan Horses • Files that are trojanized • Access Exploits • Vulnerability Scanners