Backdoor Based Attacks

Authors

  • Dr. Sunil Bhutada  Professor, IT Department Sreenidhi Institute of Science and Technology Yamnampet, Hyderabad, India
  • A. Lokesh  B. Tech, IT Department Sreenidhi Institute of Science and Technology Yamnampet, Hyderabad, India
  • S. Ashok Reddy  B. Tech, IT Department Sreenidhi Institute of Science and Technology Yamnampet, Hyderabad, India
  • M. Narasimha  B. Tech, IT Department Sreenidhi Institute of Science and Technology Yamnampet, Hyderabad, India

Keywords:

Socket, port, TCP connection, Backdoor, Virtual Machine, base64 encoding and decoding.

Abstract

Hacking is a method to exploit the vulnerabilities of a computer system and to gain access, information, privacy invasion, etc., costing many companies a huge amount of money and resources. Through python where it is a high-level programming language, and is also used in hacking as it is supported on all operating systems and many libraries related to cybersecurity. Among many techniques and tools used in hacking, the back door is a most common and useful way of attacking a computer or network. Its main purpose is to send and receive data, mostly commands, through a port to another system. Basically, the hacker installs a malicious program on the victim’s computer, which executes (on the victim’s computer) all the commands given by the hacker. To build our locally-working backdoor, we will use the socket module. Sockets and the socket API are used to send messages over the network. As we already know to send messages, there’s who sends the message, here the Hacker, and who receives the message and replies, here the Victim. After the Victim runs the malware we’ll create, it’s going to set up this type of connection between the hacker’s and victim’s system. The backdoor attack is powerful because it can’t always be detected; an antivirus can’t stop you from installing an innocent-looking app.

References

  1. Backdoor -  https://www.tutorialspoint.com/what-is-a-backdoor
  2. Socket - https://docs.python.org/2/library/socket.html
  3. Json -   https://docs.python.org/2/library/json.html
  4. Python Networking Programming -  https://www.tutorialspoint.com/python/python_networking.htm
  5. https://www.2-spyware.com/backdoors-removal - How to Avoid Backdoor
  6. Smtplib- https://docs.python.org/3/library/smtplib.html
  7. Pynput- https://pypi.org/project/pynput/
  8. Threading - https://docs.python.org/3/library/threading.html
  9. Keylogger-https://resources.infosecinstitute.com/topic/keyloggers-how-they-work-and-more/
  10. Google accounts - https://support.google.com/accounts/answer/185833?hl=en

Downloads

Published

2022-06-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Sunil Bhutada, A. Lokesh, S. Ashok Reddy, M. Narasimha, " Backdoor Based Attacks, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 9, Issue 3, pp.418-423, May-June-2022.