Académique Documents
Professionnel Documents
Culture Documents
Overview:
What is Trojan Horse? Purpose and uses. Types of Trojan Horses? Popular Trojan horses. How can you be infected?
Implementation with an example
Definition:
A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.
A Trojan gives a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Downloading or uploading of files on the user's computer Modification or deletion of files Crashing the computer Data theft (e.g. retrieving passwords or credit card information)
Remote Access Trojans Data Sending Trojans Destructive Trojans Proxy Trojans FTP Trojans security software disabler Trojans Denial-of-service attack (DoS) Trojans
Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus Flashback Trojan (Trojan.BackDoor.Flashback)
Websites: You can be infected by visiting a rogue website. Internet Explorer is most often targeted by makers of Trojans and other pests. Even using a secure web browser, such as Mozilla's Firefox, if Java is enabled, your computer has the potential of receiving a Trojan horse.
E-mail: Attachments on e-mail messages may contain Trojans. Trojan horses via SMTP.
Trojan.Gletta.A is a Trojan horse program that steals Internet banking passwords. It logs keystrokes of a victim computer when the user visits certain Web pages and then emails the log to the attacker.
2) Creates %System%\Rsasec.dll, which is a key logger and %System%\rsacb.dll, which is actually a text file key logger file. 3) Adds a registry key value "wmiprvse.exe"="%system%\wmiprvse.exe" , to the registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, so that the Trojan runs when you start Windows.
6) Later it uses its own SMTP engine to send the log file to an external mail account of the intruder. The mail has the following characteristics: Both the FROM and TO addresses have the domain "mail.ru" The subject starts with "Business News from"
How to Prevent?
References:
Contact Details:
Email Id:-parmarmayur39@gmail.com
Facebook:http://www.facebook.com/ALL.ABOUT.TECH Blog:http://mayurtech.blogspot.in/