Attacker gets  access to the trojaned system as the system  goes online
By way of the access provided by  the trojan attacker can  stage attacks of different types.
Trojans work similar to the  client-server model.  Trojans  come in two parts, a Client part and a  Server part. The  attacker deploys the  Client to connect to the Server,  which runs on the  remote machine when the  remote user (unknowingly)  executes the Trojan  on the machine. The typical  protocol used by most  Trojans is the TCP/IP  protocol, but some functions of the  Trojans may  make use of the UDP  protocol as well.
When  the Server is activated  on the remote computer, it will usually try to   remain in a stealth  mode, or hidden on the computer. This is  configurable - for  example in  the Back Orifice Trojan, the server can  be configured to remain in   stealth mode and hide its process. Once  activated, the server starts  listening  on default or configured ports  for incoming connections from  the attacker. It is  usual for Trojans to  also modify the registry  and/or use some other auto  starting method.
To  exploit a Trojan,  attackers need to ascertain the remote  IP address  to connect to the  machine. Many Trojans have configurable features   like mailing the  victim's IP, as well as messaging the attacker via ICQ  or IRC.  This is  relevant when the remote machine is on a network with  dynamically   assigned IP address or when the remote machine uses a  dial-up connection  to  connect to the Internet. DSL users on the other  hand, have static  IPs so the  infected IP is always known to the  attacker.
Most of the Trojans use  auto-starting methods so that  the servers are restarted  every time the  remote machine reboots /  starts. This is also notified to the   attacker. As these features are  being countered, new auto-starting  methods are  evolving. The start up  method ranges from associating the  Trojan with some  common executable  files such as explorer.exe to the  known methods like modifying  the  system files or the Windows Registry.  Some of the popular system files   targeted by Trojans are Autostart  Folder, Win.ini, System.ini,  Wininit.ini,  Winstart.bat, Autoexec.bat  Config.sys. Could also be used  as an auto-starting  method for Trojans.
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.