Font Size: a A A

Design And Implementation Of Stealth Backdoor

Posted on:2007-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:W J ZhuFull Text:PDF
GTID:2178360185467879Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
As much as stealth malware seemed to fade away with the DOS era, it might make a loud comeback in modem day trojans.Stealth features have been adapted to the Windows world and show up more and more often in coming malware. Coupled with the excessive complexity of modern operating systems malicious programs can hide using very simple methods.In the presentation I examine stealth techniques starting from simple tricks to dissection of several rootkits, eg: Import Address Table Modification,Export Address Table Modification,DLL Injection, System Service descriptor Table Modification. The paper mainly concentrates, on Windows NT user , user space stealth code and kernel space stealth code but some Windows 9x related topics are also covered.The last part discusses possible questions of TrojansHorse in the future.
Keywords/Search Tags:Network Security, Malware, TrojanHorse, Backdoor, Rootkit, API Hook, SSDT Hook
PDF Full Text Request
Related items