Language:EN
Pages: 3
Words: 658
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
principles incident response and disaster recovery

Principles incident response and disaster recovery page

Hacker Programs Assignment Answers

Question:

Using Table 5-4 and a Web browser, search on a few of the port numbers known to be used by hacker programs, such as Sub-7, Midnight Commander, and WinCrash. What significant information did you find in your search? Why should the information security manager be concerned about these hacker programs? What can he or she do to protect against them?

Hacker Programs Answer and Explanation

1. Port 6711 - Sub-7, DeepThroat

- Sub-7: Sub-7, also known as SubSeven or Sub7, is a backdoor program often used for remote control of a victim's computer. It allows the attacker to access files, record keystrokes, and use the computer's resources.

- As previously mentioned, Sub-7 is a notorious backdoor Trojan that has been widely used by attackers to gain remote access to victim machines.

4. Port 31337 - BackOrifice

2. System Control: Attackers can control infected systems to perform various malicious activities, including launching further attacks, using the system in botnets, or deploying additional malware.

3. Data Exfiltration: Sensitive data can be stolen using these backdoor programs, leading to significant financial and reputational damage.

2. Regular Updates: Keep all software and systems up-to-date with the latest security patches to mitigate vulnerabilities that could be exploited by such programs.

3. Intrusion Detection Systems (IDS): Deploy IDS to detect and alert on suspicious activities, such as unusual port usage or attempts to communicate over known malicious ports.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Wahida rehmani

PageId: DOCA061D59