Back Orifice 2000

Back Orifice 2000

Infobox Software
name = Back Orifice 2000



caption = Screenshot of BO2k client
developer = Dildog (cDc) (original code)
BO2k Development Team (current maintenance)
operating_system = Microsoft Windows,
Linux-systems (client only)
latest_release_version = 1.1.6 (Windows), 0.1.5 pre1 (Linux)
latest_release_date = March 21, 2007
genre = remote administration
license = GPL
website = [http://www.bo2k.com/ BO2k development site]

Back Orifice 2000 (often shortened to BO2k) is a computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.

BO2k debuted on July 10, 1999 at DEF CON 7 computer security convention in Las Vegas, Nevada. It was originally written by Dildog, a member of US hacker group cDc. It was a successor to the cDc's Back Orifice remote administration tool, released the previous year. As of 2007, BO2k is being actively developed.

Whereas the original Back Orifice was limited to the Windows 95 and Windows 98 operating systems, BO2k also supports Windows NT, Windows 2000 and Windows XP. Some BO2k client functionality has also been implemented for Linux-systems. In addition, BO2k was released as free software, which allows one to port it to other operating systems.

Plugins

BO2k has a plugin architecture. The optional plugins include
* communication encryption with AES, serpent, CAST-256, IDEA or Blowfish encryption algorithms
* network address altering notification by email and cgi
* total remote file control
* remote Windows registry editing
* watching at the desktop remotely by streaming video
* hijack capabilities allowing remote control of both the keyboard and the mouse
* a chat, allowing administrator to discuss with users
* option to hide things from system (rootkit behaviour, based on FU Rootkit)
* accessing systems hidden by a firewall (the administrated system can form a connection outward to the administrators computer. Optionally, to escape even more connection problems, the communication can be done by a web browser the user uses to surf the web.)
* forming connection chains through a number of administrated systems
* client-less remote administration over IRC
* on-line key-logging

Controversy

Back Orifice and Back Orifice 2000 are widely regarded as malware, tools intended to be used as a combined rootkit and backdoor. For example at present much antivirus software identifies them as trojan horses [ [http://www.symantec.com/press/1999/n990712.html Symantec press release] , dated 12 July 1999, accessed 8 August 2006] [ [http://www.iss.net./prReleases/pr_14513.html ISS press release] , dated 13 July 1999, accessed 8 August 2006] [ [http://www.trendmicro.com/en/about/news/pr/archive/1999/pr071299.htm Trend Micro press release] , dated 12 July 1999, accessed 8 August 2006] [ [http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=1770 CA threat description] , dated 30 November 2005, accessed 8 August 2006] [ [http://www.f-secure.com/v-descs/bo2k.shtml F-secure threat description] , accessed 8 August 2006] . This classification is justified by the fact that BO2K is often installed by a trojan horse, in cases where it is used by a criminal behind the systems administrators back. System administrators are supposed to realize this and ignore the alerts when they are using BO2K for administration of their system.

There are several reasons for this, including: the association with cDc; the tone of the initial product launch at Def Con '99 [ [http://www.cnn.com/TECH/computing/9907/21/badrap.idg/ CNN.com report "Bad rap for Back Orifice 2000?"] , dated 21 Jul 1999, accessed 8 August 2006] (including that the first distribution of BO2K by cDc was infected by the CIH virus [ [http://news.zdnet.com/2100-9595_22-515160.html ZDNet news "Back Orifice CDs infected with CIH virus"] , dated 14 July 1999, accessed 8 August 2006] ); the existence of tools (such as "Silk rope" [ [http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR%5FORIFICE%2EADD&VSect=T Trend Micro threat description] , dated 14 July 2000, accessed 8 August 2006] ) designed to add BO2K dropper capability to self-propagating malware; and the fact that it has actually widely been used for malicious purposes [ [http://seclists.org/incidents/2000/Oct/0010.html Insecure.org mailing list archive] , Rik van Riel report dated 3 October 2000, accessed 8 August 2006] [ [http://www.securityfocus.com/news/11324 Security Focus "Airport PCs stuffed with meaty goodness"] , dated 21 September 2005, accessed 8 August 2006] [ [http://www.microsoft.com/technet/security/alerts/info/inforat.mspx Microsoft Security Administrator article "Danger: Remote Access Trojans"] , September 2002 edition, accessed 8 August 2006] . The most common criticism is that BO2K installs and operates silently, without warning a logged-on user that remote administration or surveillance is taking place [ [http://www.schneier.com/crypto-gram-9908.html#BackOrifice2000 Bruce Schneier's Crypto-Gram Newsletter] , dated 15 August 1999, accessed 8 August 2006] . According to the official bo2k documentation, the person running the bo2k server is not supposed to know that it is running on his computer [ [http://bo2k.sourceforge.net/docs/bo2k_1_1_5/BasicTutorial.html Official BO2K Documentation: Basic Setup] ] .

BO2K developers counter these concerns in their " [http://bo2k.sourceforge.net/docs/bo2k_legitimacy.html Note on Product Legitimacy and Security] ", pointing out—among other things—that some remote administration tools widely recognized as legitimate, also have options for silent installation and operation.

References

External links

* [http://bo2k.sourceforge.net/ Back Orifice 2000 official site]
* [http://www.everything2.com/index.pl?node_id=769480 BO2k at everything2.com]


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Back Orifice — Saltar a navegación, búsqueda Back Orifice Desarrollador Sir Dystic (cDc) Web oficial Información general …   Wikipedia Español

  • Back Orifice — est un logiciel client/serveur d administration et de prise de contrôle à distance de machines utilisant le système d exploitation Windows ; il ne s agit pas vraiment d un virus, mais plutôt d un rootkit. Il est créé et distribué par un… …   Wikipédia en Français

  • Back Orifice — Тип RAT, вредоносное программное обеспечение Разработчик CULT OF THE DEAD COW Написана на C++ Операционная система Windows 9x Языки интерфейса Английский …   Википедия

  • Back orifice — Cet article fait partie de la série Programmes malveillants Virus Cabir MyDoom.A Tchernobyl …   Wikipédia en Français

  • Back Orifice — Entwickler Sir Dystic (cDc) Aktuelle Version 1.20 (3. August 1998) Betriebssystem Microsoft Windows Kategorie Fernwartung Lizenz …   Deutsch Wikipedia

  • Back Orifice — Infobox Software name = Back Orifice caption = screenshot of the Back Orifice client developer = Sir Dystic (cDc) operating system = Microsoft Windows, UNIX systems (client only) latest release version = 1.20 latest release date = August 3, 1998… …   Wikipedia

  • Back Office (Logiciel) — Pour les articles homonymes, voir Back office. Back office était un logiciel de la société Microsoft. La dernière version date du 28 février 2001 (sous le nom de BackOffice Server 2000). Dans les versions plus récentes de Windows, il semble avoir …   Wikipédia en Français

  • Back office (Logiciel) — Pour les articles homonymes, voir Back office. Back office était un logiciel de la société Microsoft. La dernière version date du 28 février 2001 (sous le nom de BackOffice Server 2000). Dans les versions plus récentes de Windows, il semble avoir …   Wikipédia en Français

  • Back office (logiciel) — Pour les articles homonymes, voir Back office. Back office était un logiciel de la société Microsoft. La dernière version date du 28 février 2001 (sous le nom de BackOffice Server 2000). Dans les versions plus récentes de Windows, il semble avoir …   Wikipédia en Français

  • BO2K — Back Orifice 2000 Trojanisches Pferd von cDc für WinNT/Windows 2000 Systeme …   Acronyms

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”