Académique Documents
Professionnel Documents
Culture Documents
The Trojan horse, also known as trojan, in the context of computing and software,
describes a class of computer threats (malware) that appears to perform a desirable
function but in fact performs undisclosed malicious functions that allow unauthorized
access to the host machine, giving them the ability to save their files on the user's
computer or even watch the user's screen and control the computer.
Trojan viruses can be easily and unwillingly downloaded. For example, if a computer
game is designed such that, when executed by the user, it opens a back door that allows a
hacker to control the computer of the user, then the computer game is said to be a Trojan
horse. However, if the computer game is legitimate, but was infected by a virus, then it is
not a Trojan horse, regardless of what the virus may do when the game is executed. The
term is derived from the classical story of the Trojan Horse.
Contents
[hide]
• 1 Example
• 2 Types of Trojan horse payloads
• 3 Methods of deletion
• 4 Rogue Infiltrants
• 5 See also
o 5.1 Notable instances
• 6 References
• 7 External links
[edit] Example
A program named "waterfalls.scr" serves as a simple example of a Trojan horse.
The author claims it is a free waterfall screen saver. When running, it instead unloads
hidden programs, scripts, or any number of commands without the user's knowledge or
consent. Malicious trojan horse programs conceal and drop a malicious payload on an
affected computer.
[edit] Types of Trojan horse payloads
Trojan horse payloads are almost always designed to cause harm, but can also be
harmless. They are classified based on how they breach and damage systems. The six
main types of Trojan horse payloads are:
• Remote Access
• Data Destruction
• Downloader/dropper
• Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)
• Disable security software
• Denial-of-service attack (DoS)
• Back Orifice
• NetBus
• Zlob
• Pest Trap
• ProRat
• Sub7
• Vundo
[edit] References
[edit] External links
• Analysis of targeted trojan e-mail attacks
• Trojan horses and how they are used en-masse in botnets Virus Bulletin's The
World of Botnets by Dr Alan Solomon and Gadi Evron
[hide]
v•d•e
Botnets
Main articles Botnet · Computer worm · Malware · Malbot · Operation: Bot Roast
Views
• Article
• Discussion
• Edit this page
• History
Personal tools
• Main page
• Contents
• Featured content
• Current events
• Random article
Search
Go Search
Interaction
• About Wikipedia
• Community portal
• Recent changes
• Contact Wikipedia
• Donate to Wikipedia
• Help
Toolbox
Languages
• العربية
• Bân-lâm-gú
• Bosanski
• Български
• Català
• Česky
• Dansk
• Deutsch
• Ελληνικά
• Español
• Euskara
• فارسی
• Français
• Galego
• 한국어
• Hrvatski
• Bahasa Indonesia
• Italiano
• עברית
• Latviešu
• Lietuvių
• Magyar
• Bahasa Melayu
• Nederlands
• 日本語
• Norsk (bokmål)
• Norsk (nynorsk)
• Polski
• Português
• Русский
• Shqip
• Simple English
• Slovenčina
• Slovenščina
• Српски / Srpski
• Suomi
• Svenska
• ไทย
• Tiếng Việt
• Türkçe
• 中文