Question

In: Computer Science

ClamWin identified that the TargetWindows04 machine was infected with the Back Orifice (BO) exploit. Explain how...

ClamWin identified that the TargetWindows04 machine was infected with the Back Orifice (BO) exploit.

Explain how this virus was named and why it can still be dangerous.

Solutions

Expert Solution

Answer : Given data

* Back Orifice (BO) is a trojan that provides a backdoor into your computer when active and you are connected to the Internet.

* The name Back Orifice is inspired by the name of Microsoft's BackOffice product.

* Back Orifice (BO) is a remote administration system that allows a user to take full control of a computer remotely running the Microsoft Windows operating system (OS) across a TCP/IP connection, either through a simple console or graphical user interface (GUI).

* It is still dangerous because of the following reasons.

  • There is no easy way for a computer user to know the attack is taking place, and there is no easy way to stop the attack once Back Orifice has installed itself on the computer.
  • The application is in the form of a remote administration system that is remotely installed without user interaction and does not show up in the task manager panel, so it cannot be killed.
  • It restarts itself each time the OS starts.
  • The system's client side is installed on another computer where the administrator can take control of the remote computer.

* BO has the following capabilities.

  • System control: Allows the administrator to remotely log key strokes or lock/reboot the machine.
  • It can get detailed machine information, including access to all drives and passwords saved or cached by the OS or user.
  • File system control: Allows total control of the file system from copying, modifying, locking and deleting to compression and decompression.
  • Process control: Spawns or kills processes at will.
  • Multimedia and application control: Controls any multimedia device, such as the computer’s webcam or microphone, plays audio/video (A/V) files, take screenshots and more.
  • Network control: Functions as an integrated packet sniffer, allowing the monitoring of data, logs and any passwords while redirecting any incoming packet to any port toward any other port or address.

Related Solutions

ClamWin identified that the TargetWindows04 machine was infected with the Back Orifice (BO) exploit. Explain how...
ClamWin identified that the TargetWindows04 machine was infected with the Back Orifice (BO) exploit. Explain how this virus was named and why it can still be dangerous.
explain what a share buy-back is and how companies buy back their shares • discuss the...
explain what a share buy-back is and how companies buy back their shares • discuss the benefits and costs associated with dividend payments, and compare the relative advantages and disadvantages of dividends and share buy-backs • define bonus share issues and share splits, and explain how they differ from other types of dividends and from share buy-backs • desribe factors that managers consider when setting the dividend policies for their companies
Explain Prejudice, Stereotype and Discrimination in relation to how persons who have been infected with or...
Explain Prejudice, Stereotype and Discrimination in relation to how persons who have been infected with or recovered from the COVID-19 disease are denigrated
Explain how you would investigate an HIV drug resistant strain in an HIV infected patient.
Explain how you would investigate an HIV drug resistant strain in an HIV infected patient.
Illustrate and explain how a virus-infected cell is killed by a cytotoxic T lymphocyte. (5 marks)
Illustrate and explain how a virus-infected cell is killed by a cytotoxic T lymphocyte.
Explain how you could use PCR to determine if food like spinach is infected with E.coli...
Explain how you could use PCR to determine if food like spinach is infected with E.coli or not.
Compare Mary Ainsworth 3 types of attachment and how each is identified, and explain how these...
Compare Mary Ainsworth 3 types of attachment and how each is identified, and explain how these early attachments can a lasting emotional and behavioral impact by describing examples of both positive and negative outcomes.
Based on the location the GoTo Consulting group identified a few weeks back, provide a breakdown...
Based on the location the GoTo Consulting group identified a few weeks back, provide a breakdown of the cultural considerations the new director will need to take into account when relocating and bringing on a staff made up of local nationals Should the director consider sourcing leaders from other divisions and taking them to the new location or focus on hiring local nationals as line managers, shift supervisors, and senior leaders Based on best practices and analysis of current cosmetic...
Identify and describe some of the technology innovations that Netflix was able to exploit and how...
Identify and describe some of the technology innovations that Netflix was able to exploit and how these innovations contributed to competitive advantage.
Explain the give back fallacy
Explain the give back fallacy
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT