robotjnr.blogg.se

How to detect rat using tcpview
How to detect rat using tcpview












  • Usually installed by user clicking on malicious file attachments or downloads.
  • Virus - self-replicating program that reproduces by attaching copies of itself into other executable code.
  • Log file can be found at c:\windows\system32\sigverif.txt.
  • SIGVERIF - build into Windows to verify the integrity of the system.
  • Tripwire - integrity verifier that can act as a HIDS in protection against trojans.
  • Msconfig - Windows program that shows all programs set to start on startup.
  • Process Explorer - Microsoft tool that shows you everything about running processes.
  • netstat -b - displays all active connections and the processes using them.
  • netstat -an - shows open ports in numerical order.
  • Offers DNS forwarding, port mapping and forwarding and proxying.
  • Can connect over TCP or UDP, from any port.
  • From attack machine nc -l -p 5555 opens a listening port on 5555.
  • Provides all sorts of control over a remote shell on a target.
  • Covert Channel Tunneling Trojan (CCTT) - a RAT trojan creates data transfer channels in previously authorized data streams.
  • Command Shell Trojan - Provides a backdoor to connect to through command-line access.
  • Trojans are means of delivery whereas a backdoor provides the open access.
  • To hackers, it is a method to gain and maintain access to a system.
  • how to detect rat using tcpview

    Trojans - software that appears to perform a desirable function but instead performs malicious activity.Exploit Kits - help deliver exploits and payloads.Packers - use compression to pack the executable which helps evage signature based detection.

    how to detect rat using tcpview

    Crypters - use a combination of encryption and code manipulation to render malware undetectable to security programs.Wrappers - programs that allow you to bind an executable to an innocent file.Covert Channels - used to transport data in unintended ways.Overt Channels - legitimate communication channels used by programs.Most is downloaded from the Internet with or without the user’s knowledge.Malware - software designed to harm or secretly access a computer system without informed consent.














    How to detect rat using tcpview