Lecture 6. Trojans


What Is a Trojan?

A trojan horse, or trojan is


What do trojans do?


How Does One Detect a Trojan?

one-way hash function H may be considered as a stronger form of checksum or CRC functions, and has the following properties:


MD5

SHA-1

SHA-1 (Secure Hash Algorithm) is a message digest algorithm, designed by NSA for Digital Signature Standard, which produces 160-bit output. For details, see FIPS180-1.

SHA-1 is considered much stronger than MD5.

TripWire

TripWire is a comprehensive system-integrity tool.

The program reads your environment from a configuration file. That file contains all filemasks (the types of files that you want to monitor). This system can be quite incisive. For example, you can specify what changes can be made to files or directories of a given class without TripWire reporting the change.

The original values (digital signatures) for these files are kept within a database file. That database file (simple ASCII) is accessed whenever a signature needs to be calculated.

Hash functions included in the distribution are: MD5, MD4, CRC32, MD2, Snefru, SHA.

TripWire is a magnificent tool, but there are some security issues.
Its databases can be altered by a cracker. Therefore, it is recommended that the database be stored in a secure place, and perhaps on read-only media.

Another issue is that files might have been tampered even before TripWire is run.