Skip to main content

Network and Systems Hardening

Network hardening Make sure your firewall is correctly configured, that all rules are periodically reviewed, that remote access points and users are secure, that any open network ports are blocked, that extraneous protocols and services are disabled and removed, that access lists are in place, and that network data is encrypted. Systems Hardening Audit your current systems: Conduct a thorough audit of your current technologies (you can use). To identify system weaknesses and order remedies, use security auditing techniques like configuration management, vulnerability scanning, and penetration testing. Utilize industry standards from NIST, Microsoft, CIS, DISA, and other sources to conduct system hardening assessments against resources. Create a strategy for systems hardening: Not every system needs to be hardened at once. Instead, develop a strategy and plan based on the risks found in your IT ecosystem, and then utilize a staged approach to fix the most serious issues. Patch ...

Trojan/Droppers/Wrappers/Crypter/Remote Access Trojans (RAT)

 Trojan Construction Kit

Trojan Construction Kit allow the attacker to create their own Trojans. These customized Trojans can be more dangerous for the target as well as an attacker if it is not executed properly or backfires. These customized Trojans created by using Construction kits can avoid detection from virus and Trojan scanning.

Some Trojan Construction Kits are: -

Dark Horse Trojan Virus Maker

Senna Spy Generator

Trojan Horse Construction Kit

Progenic mail Trojan Construction Kit

Pandora's Box

Droppers

A dropper is a software or program that is specially designed for delivering a payload on the target machine. The main purpose of Dropper is to install malware codes on to the victim’s computer without alerting and avoiding detection. It uses various methods to spread and install malware.

Trojan-Dropper Tools

TrojanDropper: Win32/Rotbrow.A

TrojanDropper: Win32/Swisyn

Trojan: Win32/Meredrop

Troj/Destover-C

Wrappers

It is a non-malicious file that binds the malicious file to propagate the Trojan.Basically, Wrapper binds a malicious file in order to create and propagate the Trojan along with it to avoid detection. Wrappers are often popular Executable file such as games, music and video files, as well as any other non-malicious file.

Crypter A Crypter is software used while creating Trojans. The basic purpose of Crypter is it encrypt, obfuscate, and manipulate the malware and malicious programs. By using Crypter for hiding a malicious program, it becomes even more difficult for security programs such as anti-viruses to detect. It is popularly used by hackers to create malware which is capable of bypassing security programs by presenting itself as a non-malicious program until it gets installed. Some of the available Crypter to hide malicious programs are: - Cryogenic Crypter Heaven Crypter Swayz Cryptor Remote Access Trojans (RAT) Remote Access Trojan (RAT) allows the attacker to get remote desktop access to victim's computer by enabling Port which allows the GUI access to the remote system. RAT includes a back door for maintaining administrative access and control over the victim. Using RAT, an attacker can monitor user's activity, access confidential information, take screenshots and record audio and video using a webcam, format drives and alter files, etc. The following are the list of RAT tools: - Optix Pro MoSucker BlackHole RAT SSH-R.A.T njRAT Xtreme RAT DarkComet RAT


Comments

Popular posts from this blog

Concepts, Types, and Phases of Hacking

 Concepts, Types, and Phases of Hacking A hacker is someone who is intelligent enough to use various tools and techniques to gain unauthorized access to a system in order to steal information such as usernames, passwords, financial information, credit card information, business data, and personal information. Hackers are very skilled, capable of creating software, and exploring both hardware and software. Their motives can range from paying people to hack computers to engaging in unlawful activity for enjoyment. Black Hats Hacker with amazing talents who engages in malicious and destructive acts, often known as crackers White hats Security Analyst or individuals with hacking skills using them for defensive purpose  Gray Hats Gray Hats are those work for both offensively and defensively Suicide hackers Suicide hackers are those who aim for destruction without worrying about punishment. Script Kiddies Unskilled hackers, hacking and compromising systems using tools are scrip...

Application scanners

 HCLTech AppScan Standard is a Dynamic Analysis testing tool designed for security experts and pen-testers to use when performing security tests on web applications and web services. It runs automatic scans that explore and test web applications, and includes one of the most powerful scanning engines in the world. WebInspect is an automated dynamic testing solution that provides comprehensive vulnerability detection. Fortify WebInspect Benefits Vulnerabilities are discovered faster and earlier. Automation and agent technology can help you save time. Users can utilize crawl web technologies and modern frameworks. ScanCentral DAST helps you manage enterprise app security risk.

Different type of attacks

 Different type of attacks 1 . Operating System Attacks - Due to Bug and Unpatched 2 . Misconfiguration attack 3 . Application type attack Virtual Machines 1. VMware 2. VirtualBox 3. Parallel Desktop 4. MobaLive CD 5. VMLite XP Mode 6. VirtualBox 7. Parallel Workstation