Page 137 - DCAP516_COMPUTER_SECURITY
P. 137

Unit 11: Threats in Network




               words. Another form of password cracking attack is ‘brute force’ attack. In this form of  Notes
               attack, all possible combinations of letters, numbers and symbols are tried out one by one
               till the password is found out. Brute force attacks take much longer than dictionary attacks.
               Another popular password cracking utility is called Brutus. Brutus has both dictionary
               attack as well as a brute force attack capabilities. Users can customize the brute force attack
               depending on any information that they may have about the password that they are
               trying to crack.
          6.   Buffer Overflow: Also known as buffer overrun, input overflow and unchecked buffer
               overflow, this is probably the most common way of breaking into a computer. It involves
               input of excessive data into a computer. The excess data “overflows” into other areas of the
               computer’s memory. This allows the hacker to insert executable code along with the
               input, thus enabling the hacker to break into the computer.
          7.   Trojans: The term Trojan has an interesting history. In the 12th century BC, Greece declared
               war on the city of Troy. The dispute erupted when the prince of Troy abducted the queen
               of Sparta and declared that he wanted to make her his wife. This angered the Greeks and
               especially the queen of Sparta. The Greeks tried for ten years but met with no success as
               Troy was very well fortified. In the last effort, the Greek army pretended to be retreating,
               and left behind a huge wooden horse. The people of Troy saw the horse, and, thinking it
               was some kind of a present from the Greeks, pulled the horse into their city, unaware that
               the hollow wooden horse had some of the best Greek soldiers sitting inside it. Under the
               cover of night, the soldiers came out and opened the gates of the city, and together with
               the rest of the army, killed the entire army of Troy. Similar to the wooden horse, a Trojan
               horse program pretends to do one thing while actually doing something completely
               different.
               The following are the most common types of Trojan horses:
               (a)  Remote Administration Trojans (RATs): These are the most popular Trojans. They let a
                    hacker access the victim’s hard disk, and also perform many functions on his computer
                    for example, shut down his computer, open and close his CD-ROM drive etc. A
                    Remote Administration Trojan gives the hacker complete control over the victim’s
                    computer, while Password Trojans search the victim’s computer for passwords and
                    then send them to the hacker. Modern RATs are very simple to use. They come
                    packaged with two files - the server file and the client file.
                    Some Trojans are limited by their functions, but more functions also mean larger
                    server files. Some Trojans are merely meant for the attacker to use them to upload
                    another Trojan to his target’s computer and run it; hence they take very little disk
                    space. Hackers also bind Trojans into other programs, which appear to be legitimate
                    e.g. a RAT could be bound with an e-greeting card.





             Notes  Most RATs are used for malicious purposes, to irritate, scare people or harm
             computers. There are many programs that detect common Trojans. Firewalls and anti-
             virus software can be useful in tracing RATs.

                    Remote administration Trojans open a port on user’s computer and bind themselves
                    to it. Then, once someone runs his client program and enters the victim’s IP address,
                    the Trojan starts receiving commands from the attacker and runs them on the victim’s
                    computer.

                    Some Trojans let the hacker change this port into any other port and also put a
                    password so only the person who infects the specific computer will be able to use



                                           LOVELY PROFESSIONAL UNIVERSITY                                   131
   132   133   134   135   136   137   138   139   140   141   142