Seminar On Trojan Horse

50 %
50 %
Information about Seminar On Trojan Horse
Engineering

Published on July 21, 2014

Author: nikhilchabukswar3

Source: slideshare.net

Description

This is a power-point presentation on "Trojan Horse" which is a hacking technique mostly used by hackers.
Trojan appears to be useful program but contain hidden code's such as virus.

TROJAN HORSE BY- NIKHIL CHABUKSWAR TE ‘C’ 33506 Bansilal Ramnath Agarwal Charitable Trust’s Vishwakarma Institute of Information Technology Pune – 411048. Department of Computer Eng.

CONTENTS • What is Trojan ? • Tasks Of Trojan • How Trojan Work • Attaching a Trojan • storage Locations And Various Trojans • Algorithm • How can you be infected • Aim of attacker • Trojan Examples • Preventive measure

WHAT IS TROJAN ?

HOW DO TROJAN WORKS ? • Nothing But a Server Client Program • Uses TCP/IP protocol as well as UDP protocol • It is only be send to the target system by user interaction only.

TASKS OF THE TROJAN • erasing or overwriting data on a computer • corrupting files in a subtle way • spreading other malware, such as viruses. In this case the Trojan horse is called a 'dropper'. • To launch DDoS attacks or send Spam. • logging keystrokes to steal information such as passwords and credit card numbers (known as a key logger) • phish for bank or other account details, which can be used for criminal activities. • Shutting down the windows and rebooting of windows etc.

HOW TO ATTACH THE TROJAN? • Without Changing the File size • Generally Attached with game or email

WHERE THEY LIVE…. • Autostart Folder The Autostart folder is located in C:WindowsStart MenuProgramsstartup and as its name suggests, automatically starts everything placed there. • Win.ini Windows system file using load=Trojan.exe and run=Trojan.exe to execute the Trojan

ALGORITHM • Trojan horse attack, used a quantum cryptographic key algorithm with EPR pairs. • With Quantum cryptography we can create a communication chancel where it is impossible to eavesdrop without disturbing the transmission.

TROJAN VARIATIONS • Remote Access Trojans • Password Sending Trojans • Denial Of Service (DoS) Attack Trojans • Keyloggers

HOW CAN YOU BE INFECTED…… • Via Email (Attachments) • Physical Access • Visiting Untrusted websites • Peer to peer download system • Installing the untrusted software's.

WHAT IS ATTACKER LOOKING FOR ? • Credit Card Information (often used for domain registration, shopping with your credit card) • Any accounting data (E-mail passwords, Dial-Up passwords, WebServices passwords, etc.) • Email Addresses (Might be used for spamming, as explained above) • Work Projects (Steal your presentations and work related papers) • Children's names/pictures, Ages (paedophile attacker?!) • School work (steal your papers and publish them with his/her name on it)

SOME WELL KNOWN TROJAN • NetBus • Beast • SubSeven • BOXP

NETBUS TROJAN:-

SERVER SETUP FOR NETBUS

CONNECTION PROCESS.

CONSEQUENCES OF A TROJAN HORSE • It will cause your computer to run slow • All of your personal data can be stolen or corrupted. • When you open a program it will continue to open programs on its own.

HOW TO PREVENT • Anti-Virus (AV) Scanners • Anti-Trojan Software • E.g Trojan Elite, Trojan Killer. • Clean Yourself • Online Scanning Services

CONCLUSION • In this seminar we have learned what is Trojan and all the functionality and aspects of the Trojan horse.

REFERENCES 1. Hacking tools & techniques and Incident handling, NIIT by prentice-hall INDIA(2005) 2. Denial of Service Attacks (2001). Retrieved May 20, 2004, from http://www.cert.org/tech_tips/denial_of_service.html. 3. http://www.windowsecurity.com/Trojan_horse

Add a comment

Related presentations

Discrete element method modelling (DEM) has proven over many years to be a powerfu...

Segregation Testing to confirm packer isolation and well integrity. Monitor w...

A small presentation of History matching and a case study on it. Also on Gas mater...

Manual 2 pavco cad

Manual 2 pavco cad

November 2, 2014

CONSTRUCION

Tire sua duvidas a respeito da implementação da NR 12 Converse com um especialis...

Related pages

Foundational Workshops | TROJAN HORSE METHOD

Trojan Horse consists of four day foundational workshops to give people hands-on experience with the Trojan Horse Method.
Read more

seminar on spyware and trojan horse

Important..! Some latest information/details about seminar on spyware and trojan horse is Hidden .. Please click here Do You Want To See More Details About ...
Read more

TROJAN HORSE METHOD | HOW TO WIN THE WAR IN THE COURTROOM

Trojan Horse is a revolutionary trial skills program that trains you to win in the courtroom. You will learn how to develop the emotional core of your case ...
Read more

Seminar On Trojan Horse - Engineering - documents

Turkey’s Trojan Horse on Cyprus: The Poisoned Fruit from the Supreme Crime of Aggression
Read more

TROJAN HORSES : Seminar topic at SeminarCollections.com

TROJAN HORSES : A seminar about TROJAN HORSES ... Abstract A Trojan Horse is a one which pretend to be useful programs but do some unwanted action.
Read more

Trojan Horse Method - Facebook

Trojan Horse Method, Los Angeles, California. 938 likes · 4 talking about this. Trojan Horse is a trial skills program that can, in 4 days, break your...
Read more

Spyware and Trojan Horses [SS1] - School of Computer Science

1 - Abstract. This seminar covers a contemporary issue in Computer Security; Spyware and Trojan Horses. These are separate security threats to networked ...
Read more

How to Get Rid of Trojan Horses: 5 Steps (with Pictures)

How to Get Rid of Trojan Horses. A Trojan horse virus is a malware program that attaches itself to an innocuous file and embeds itself in your system.
Read more