Home Schools Links Virus List Add a School Change a Link Dead Link
Link to us Financial Aid Free E-mail Guestbook Cool Links Tell A Friend
NextCard Visa If your School has a Schools Alumni Page let us know Solve your computer needs at eBay


BACK ORIFICE 2000
AKA
BACKORIFICE2K.TROJAN, BO
2000, BO2K, BO2K BACKDOOR

 
Tell A Friend
about this
Page
Tell me when
this page
is updated
Link to us
Our Sponsor

Back Orifice, a Windows Remote Administration Tool, was released in 1998. This tool allows a user to remotely control a computer across a TCP/IP connection using a simple console or GUI application. To name a few, these control includes file system, process, network and multimedia controls. To the makers, BO ( Back Orifice ) still has its flaws. One of which is that it is not capable of running on NT machines.

On July 10, 1999, in the recently concluded DEFCON 7.0 (an annual convention for hackers), the BACK ORIFICE 2000 was released. Aside from the remote control capabilities in Back Orifice, the creators added some notable features:
- Windows NT support
- An open plug-in architecture to allow 3rd party add-ons
- Strong cryptography to ensure secure network administration (XOR/3DES)
- Open source, available under the GNU Public License
- TCP/IP or UDP port usage Details:
This hacker tool has developed into a full-blown Remote Administration Tool with almost complete control of your system. Because the full source code has been released to the public it is highly possible that different variants based on this Trojan will surface in the near future.
By default, the Server/Dropper portion of BO2K will edit the Windows registry by adding the "UMGR32.EXE" key in the following path:
For Windows 95/98 -
\\HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENT VERSION\RUNSERVICES
For Windows NT -
\\HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENT VERSION\RUN
BO2K is equipped with stealth capabilities and will not show up in your Windows Task Manager if configured to do so. The default setting will show that the UMGR32 task is running as a Remote Administration Service.
Note: Because the Server portion can be custom configured before being sent, it is possible that the key value assigned may be changed to something else depending on the file that will be dropped!

To clean BO2K from the infected system, you must use a Windows Registry Editor such as REGEDIT.
1. Take note of all the detected files
2. Search for the keys containing any of the detected files on your list.
By default this would be the "UMGR32.EXE" key and is located at -
When running Windows 95/98 -
\\HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENT
VERSION\RUNSERVICES\UMGR32.EXE
When running Windows NT -
\\HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT
\WINDOWS\CURRENT VERSION\RUN\UMGR32.EXE
3. Delete the key entries in the registry
4. Shutdown to DOS and manually delete the listed files (by default UMGR32~1.EXE) in the \WINDOWS\SYSTEM directory and reboot your
system afterwards
5. For Windows NT you must reboot first to remove the process in memory and then delete the UMGR32.EXE file from the \WINNT\SYSTEM32
6. Scan your system once more to make sure you have removed all BO2K variants installed on your system. If ever you will have to return to Step 1

[MANUAL DETECTION]
Note: This is only true if the BO2K Trojan was sent to you using the default configuration!
1. Look in your \WINDOWS\SYSTEM (for Windows 95/98) or \WINNT\SYSTEM32 (for Windows NT) directory for an existing file called UMGR32.EXE
2. Alternatively you can also look at the Windows Task Manager for the UMGR32 service process
3. Follow the steps outlined in [REPAIR]
Note: This report will be updated when new information and developments of this new threat arises.

 


 

[an error occurred while processing this directive]

Gator fills out forms and remembers passwords!


Howdy!!!
Welcome to the McCann's PooR Farm
I'm not with any school or schools,
Just a disable grandpa with 17 grand kids, 1 Great grand Kid
 
Sorry! about all of the adds, Our Cost just keeping going up.
Please click on one of them and help us out. or
Send $1.00 U.S. to:
McCann's Poor Farm
20509 Lawrence 2207
Aurora, Mo. 65605-7275
Thank You,
Junior McCann
Webmaster
and the GrandKids
 
See what the experts have to say about the McCann's Poor Farm Web Page
 
Legal Disclaimer - We Are in no way connected with any School and or Companies linked to this page. Links are provided as a courtesy only.

Where Visitors Come From:

Argentina, Australia, Austria, Belarus, Belgium, Bermuda, Brazil, Brunei Darussalam, Bulgaria, Canada, Chile, Columbia, Costa Rica, Croatia, Croatia/Hrvatska, Czech Republic, Denmark, Dominican Republic, Ecuador, Egypt, Estonia, Finland, France, Germany, Ghana, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan, Jordan, Korea, Korea, Republic of, Latvia, Lebanon, Lithuania, Luxembourg, Macedonia, Malaysia, Mexico, Moldova, Netherlands, New Calendonia, New Zealand, Norway, Old style Arpanet, Papua New Guinea, Peru, Philippines, Poland, Portugal, Romania, Russian Federation, Saudi Arabia, Singapore, Slovakia, Slovenia, South Africa, South Korea, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, USA Government, USA Military, Viet Nam
Tell A Friend
about this Page
Tell me when this page
is updated

Click Here!


Home Schools Links Virus List Add a School Change a Link Dead Link
Scholarships Financial Aid Free E-mail Guestbook Cool Links Tell A Friend
Put a Link on your Web Page

- Legal Disclaimer -
This Website Is For Your Entertainment Purposes Only!
We Are in no way connected with
any School and or Companies linked to this page.
Links are provided as a courtesy only.
 
http://www.poor-farm.com/
webmaster@poor-farm.com
McCann's PooR Farm
Aurora, Mo. 65605
© 2001