The hacker explains the four popular backdoor technologies (2)

  

First, the tunnel sends the intruder a confirmation data to report the existence of the tunnel; then the tunnel immediately sends a new connection to request the intruder's attack data and process it. The data sent by the intruder from the HTTP port; finally, the tunnel performs the operations that the intruder wants. Since this is a "normal" data transfer, the firewall does not see it. But what if the target does not open port 80? Unauthorized opening of a port is tantamount to suicide. But the intruder won't forget the cute NetBIOS port - the 139 port that has been open for years, sharing data with it, why not? Tunnel technology makes the back door concealed to another level, but this does not mean that it is impeccable, because an experienced administrator will see the abnormal scene through Sniffer... The tunnel attack is defeated by the administrator, but a kind of More terrible intrusions are being carried out secretly...

3. Useless data transmission?

The thief under the eyelids - ICMP

ICMP, Internet Control Message Protocol, the most common network messages, have been used extensively in flood blocking attacks in recent years. But few people have noticed that ICMP is also secretly involved in this Trojan war... The most common ICMP message is used as a pathfinder - PING, which is actually a Type 8 ICMP data, the protocol specifies the remote machine After receiving this data, it returns a response of type 0, reporting "I am online". However, since the ICMP message itself can carry data, it is destined to become an effective assistant for the intruder. Since ICMP messages are handled by the system kernel and it does not occupy ports, it has a high priority. ICMP is like a relative of the system kernel, and can be blocked by any guard. So, the old man in the basket with weapons is ringing the president's door...

The back door using special ICMP data is quietly Popular, this seemingly normal data under the supervision of the firewall is the master of the victim, even if the administrator is an experienced master, will not think that these "normal" ICMP messages are swallowing his machine. Some people may say that catching the bag to see it. However, in practical applications, most of the ICMP messages that pass data are definitely encrypted. How do you check them?

However, ICMP is not invincible. Administrators with more experience simply ban all ICMP message transmissions, so that the relatives are no longer close to the system, although doing so will affect some of the normal functions of the system. However, in order to avoid being murdered by relatives, I can only endure it. The most intimate and least suspected person is often the one who is the easiest to kill you.

Unusual postman - IP header strategy

We all know that the network is based on IP datagrams, everything must deal with IP, but even IP This basic postman was also bought by the intruder, and the war never stops... Why? Let's take a brief look at the structure of an IP datagram. It is divided into two parts, the first part and the body. The first part is filled with address information and identification data, just like an envelope; the body is the data we are familiar with, just like letterhead. Any message is wrapped in an IP message. Usually we only pay attention to what is written on the letter, but we ignore the application of potassium cyanate on the envelope. As a result, many administrators die from undetectable suspects...

This is caused by a defect in the protocol specification. This error is not unique, just as the SYN attack is also caused by a protocol specification error. Similarly, both use the IP header. SYN uses a fake envelope, while the "socket" Trojan smears the extra white space on the envelope - the IP protocol specifies that the IP header has a certain length to place the flag (Express? Flat?), Additional data (remarks on the letter), resulting in a few bytes of blank in the IP header, do not underestimate these blanks, it can carry highly toxic substances. These seemingly harmless letters will not be intercepted by the guards, but the president is unknowingly dead in the office...

The intruder fills the gaps in the IP header with short attack data, if the data is too More, just send a few letters. The postman who mixed into the victim's machine records the "extra" content of the envelope. When the content can be put together into an attack command, the attack begins...

Conclusion

Backdoor technology has developed to this day, It is no longer a rigid machine-to-machine war. They have learned to test humans. If the current defense technology is still stuck in simple data judgment processing, it will be defeated by countless new backdoors. The real defense must be based on human management operations, rather than relying solely on machine code, otherwise your machine will be corrupted beyond recognition...

Copyright © Windows knowledge All Rights Reserved