Why Do Trojan Horses Use Denial-Of-Service Attacks?

Great Essays
This week’s lab introduces the student to various types of attacks that can be implemented by distributing a Trojan Horse script or by performing a variety of Denial-of-Service attacks (DoS). To begin to understand how these attacks are performed, the student is instilled with the knowledge as well as the use of file-hashes to identify compromised files and also how to generate file-hashes to establish baseline standards, which could benefit a Tripwire type regiment. Then, the lab takes the student through performing the various tasks associated with implementing such attacks by crafting a Trojan horse-like script. Additionally, the student is exposed to various DoS attacks to see how their use affects a computer system. The goal is not only to show how to identify and mitigate these types of attacks, but to also …show more content…
This is because many software purveyors offer file-hashes to help with the identification of modified software, which may contain malicious Trojan horse-like code. File hashing referrers to the act of using message digests and algorithms to generate hash codes that help validate that a downloaded file, or a file on a computer system, to ensure it has not been corrupted, or influenced, in any other way than originally intended. Project 10-1, shows how these file-hashes can be used by having the student download a version of Wireshark from www.wireshark.org. Although, the lab calls for a Windows Vista version of Wireshark to be downloaded, personal preference and necessity, dictated that the source code version to be downloaded instead. Following the instructions provided, the file containing the formatted file-hashes for the Wireshark download (version 2.0.2) was located under the “Verifying Downloads” header on Wireshark’s download web site. This signed file and its contents are shown in Appendix A, figures 1 and

Related Documents

  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 3 e. How many options are there? How many of these are required?…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Hacker Access: The team focused on patch management, firewall strictness, DNS redundancy, IDPS, authentication, and role-based access control to reduce network access…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    A scheduled job was also found which was used to spawn the DOS windows to execute the virus application files. Further investigation revealed that a someones password was cracked, allowing the hacker to gain access and infiltrate the server, stage the files, and allow deeper access into the network. Much can learned from this attack. First, the University had a very poor password policy, which allowed an existing user to create a password phrase that was the same as his user login name. Nor were the passwords forced expire after a certain number of days.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The authors of the book suggest physical means of making sure that your personal information does not get into the wrong hands. So what will it be: hammer or axe? ` In conclusion, the third chapter of Blown to Bits was very informative. “Ghosts in the Machine” was a chapter about how information can be hidden within computers. It is important to be careful when sending sensitive information.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Meet Brian Thomas Mettenbrink, an unsuspecting 20-year-old computer geek from Nebraska. He looks just like you and me, acts just like you and me, but yet there is a defining difference about him that separates us: he will be serving a year sentencing in a federal prison for his relation to the 2008 DDoS (distributed denial-of-service) attack on the Church of Scientology’s website called Project Chanology. The goal of a DDoS attack is to overwhelm the targeted website with repeated access requests to the point where the website either slows down to a crawl or goes offline. Prior to the cyber-attack, a video from 2004 depicting actor, Tom Cruise, preaching the churches strange and creepy sentiments was leaked online and viewed millions of times.…

    • 1865 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Cora Garcia Mrs. Briscoe Honors English 1 Were You Hacked, Or Nah? It’s more than likely that you have been hacked before. Records say that more than 145 million Americans have been victims to hackers. It can be useful to think of hackers as burglars and malicious software as their burglary tools.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Benson Topp owner of Topp Land Surveyors in Columbia, South Carolina is having internet connection problems. Mr.Topp uses a broadband digital subscriber line for his internet access. I am going to research the problem and share the possible causes of his internet connection problems. I am going to use Window’s help and support. According to www.sockets.com/winsock2.html Winsock has been a standard since January 1993 that is a powerful and flexible for creating universal TCP/IP applications.…

    • 274 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013). Method for data exfiltration includes: Backdoors: This method used by the attacker to capture keystrokes, as well as video and audio of the system’s environment, using attached audio microphones and video cameras File transfer protocols Abuse: Attackers can abuse legitimate Windows features as well.…

    • 1307 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays