Trojans And Backdoors Response

Trojans And Backdoors Response

[ad_1]

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Hello everyone,

There are a variety of different forms and versions of Trojan malware and sniffers. For this situation the end goal is the access of sensitive data. The attack would be to smuggle a specific sniffer that will capture data in some way by using Trojan malware. The Trojan could take on a number of forms to be executed on the victim’s computer. It needs to infect and be attached to a legitimate file of some kind. It could be an email with an executable file or some kind of download. It just has to look like something completely innocent and trustworthy. Once it is executed, the Trojan releases its payload. In this instance the payload will be address resolution protocol (ARP) poisoning. This sniffer proceeds to poison the ARP cache of hosts on the network causing network traffic to be directed to the hacker (Baltazar, 2006).

The flaw hypothesis methodology for the hacker starts within an examination and brainstorming on paper, if you will, of a series of potential vulnerabilities in the target system. These areas of examination include past flaws in similar systems, unclear design, circumvention of security controls, incompleteness in designs and policies, any deviation from recommended policy norms, special precautions and system anomalies, and operational and developmental practices and prohibitions ( Weissman, 1995). Once a plan is produced, the penetration hack commences.

Jaron

Baltazar, J. (2006, August 25). Trojan Uses ARP Poisoning. Retrieved July 30, 2020, from https://blog.trendmicro.com/trendlabs-security-intelligence/trojan-uses-arp-poisoning/

Weissman, C. (1995, January 24). SECURITY PENETRATION TESTING GUIDELINE: A Chapter of the Handbook for the Computer Security Certification of Trusted Systems [PDF]. NRL Technical Memorandum.

RESPONSE 2:

Hello Class,

I hope everyone is having a great week! This week we are discussing how a malicious user would use a trojan with a sniffer to access sensitive data. A sniffer can obtain network traffic as it goes across the network. That is not all, according to Sean -Philip Oriyano “a sniffer can give an attacker access to a large amount of information, including e-mail passwords, Web passwords, File Transfer Protocol (FTP) credentials, e-mail contents, and transferred files” (Oriyano, (2013). A good example of a sniffer is Wireshark or even Tcpdump which is not so surprising. So, we all have pretty much used a sniffer in this class. Additionally, a malicious user being able to effectively use a sniffer could have dangerous outcomes.

A trojan is a virus that allows one to do a few things, but what I have been looking at in particular is backdoors. If a trojan opens a backdoor into your computer, they will be able to access the computer and control it. According to Webroot.com, “Backdoor Trojans will allow hackers to remotely access and control a computer, often for the purpose of uploading, downloading, or executing files at will” (N/A, (2020). This type of virus is truly scary, and one idea that comes to my mind, is a malicious user getting a person’s personal information and baiting them into clicking onto an email to open a backdoor. If a person has someone’s personal information, they could most certainly trick them into downloading something, especially if the attacker is studying the user, or has access to any of their personal accounts. Using a trojan and a sniffer at the same time could definitely cause a lot of problems for someone.

An attacker using the Flaw Hypothesis Methodology could use it to attempt or gain ground into a system. They would gather specific information, make them a list of vulnerabilities, test them out, and potentially find more access points like it (Bishop, (2004).

-John

Reference(s)

Bishop, Matt. (2004). Chapter 20: Vulnerability Analysis. Retrieved from http://nob.cs.ucdavis.edu/book/book-intro/slides/20.pdf

N/A. (2020). What is a Trojan Virus? Retrieved from https://www.webroot.com/us/en/resources/tips-articles/what-is-trojan-virus

Oriyano, S. (2013). Hacker Techniques, Tools, and Incident Handling. [VitalSource Bookshelf]. Retrieved from https://online.vitalsource.com/#/books/9781284047455/

The post Trojans And Backdoors Response appeared first on Versed Writers.

[Button id=”1″]

[ad_2]

Source link

"96% of our customers have reported a 90% and above score. You might want to place an order with us."

Essay Writing Service
Affordable prices

You might be focused on looking for a cheap essay writing service instead of searching for the perfect combination of quality and affordable rates. You need to be aware that a cheap essay does not mean a good essay, as qualified authors estimate their knowledge realistically. At the same time, it is all about balance. We are proud to offer rates among the best on the market and believe every student must have access to effective writing assistance for a cost that he or she finds affordable.

Caring support 24/7

If you need a cheap paper writing service, note that we combine affordable rates with excellent customer support. Our experienced support managers professionally resolve issues that might appear during your collaboration with our service. Apply to them with questions about orders, rates, payments, and more. Contact our managers via our website or email.

Non-plagiarized papers

“Please, write my paper, making it 100% unique.” We understand how vital it is for students to be sure their paper is original and written from scratch. To us, the reputation of a reliable service that offers non-plagiarized texts is vital. We stop collaborating with authors who get caught in plagiarism to avoid confusion. Besides, our customers’ satisfaction rate says it all.

© 2022 Homeworkcrew.com provides writing and research services for limited use only. All the materials from our website should be used with proper references and in accordance with Terms & Conditions.

Scroll to Top