What is a Trojan ?
"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system".
Types of Trojan :-
The different types of Trojan Horses are as follows-
1) Remote Access Trojans :- a Remote Access Trojans are potentially the most damaging, designed to provide the attacker with complete control of the victim's system.
2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.
3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.
4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.
5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install futher malware on your computer.
6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.
7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".
How Trojan Works ?
Trojans typically consist of two parts, a client part and a server part. When a unknowingly runs a Trojan server on his machine, the attacker then uses the client part of that Trojan to connect to the server module and start using the Trojan. The protocol usually used for communications is TCP, but some Trojans' functions use other protocols, such as UDP, as well. When a Trojan server runs on a victim’s computer, it tries to hide somewhere on the computer; it then starts listening for incoming connections from the attacker on one or more ports, and attempts to modify the registry and/or use some other auto-starting method.
It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP . ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.
Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.
How Trojan Horses Are Installed ?
Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
1. Software Downloads
2. Websites containing executable content
3. Email Attachments
4. Application Exploits
5. Social Engineering Attacks
Tuesday, October 12, 2010
Subscribe to:
Post Comments (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
No comments:
Post a Comment