Published on July 21, 2014
TROJAN HORSE BY- NIKHIL CHABUKSWAR TE ‘C’ 33506 Bansilal Ramnath Agarwal Charitable Trust’s Vishwakarma Institute of Information Technology Pune – 411048. Department of Computer Eng.
CONTENTS • What is Trojan ? • Tasks Of Trojan • How Trojan Work • Attaching a Trojan • storage Locations And Various Trojans • Algorithm • How can you be infected • Aim of attacker • Trojan Examples • Preventive measure
WHAT IS TROJAN ?
HOW DO TROJAN WORKS ? • Nothing But a Server Client Program • Uses TCP/IP protocol as well as UDP protocol • It is only be send to the target system by user interaction only.
TASKS OF THE TROJAN • erasing or overwriting data on a computer • corrupting files in a subtle way • spreading other malware, such as viruses. In this case the Trojan horse is called a 'dropper'. • To launch DDoS attacks or send Spam. • logging keystrokes to steal information such as passwords and credit card numbers (known as a key logger) • phish for bank or other account details, which can be used for criminal activities. • Shutting down the windows and rebooting of windows etc.
HOW TO ATTACH THE TROJAN? • Without Changing the File size • Generally Attached with game or email
WHERE THEY LIVE…. • Autostart Folder The Autostart folder is located in C:WindowsStart MenuProgramsstartup and as its name suggests, automatically starts everything placed there. • Win.ini Windows system file using load=Trojan.exe and run=Trojan.exe to execute the Trojan
ALGORITHM • Trojan horse attack, used a quantum cryptographic key algorithm with EPR pairs. • With Quantum cryptography we can create a communication chancel where it is impossible to eavesdrop without disturbing the transmission.
TROJAN VARIATIONS • Remote Access Trojans • Password Sending Trojans • Denial Of Service (DoS) Attack Trojans • Keyloggers
HOW CAN YOU BE INFECTED…… • Via Email (Attachments) • Physical Access • Visiting Untrusted websites • Peer to peer download system • Installing the untrusted software's.
WHAT IS ATTACKER LOOKING FOR ? • Credit Card Information (often used for domain registration, shopping with your credit card) • Any accounting data (E-mail passwords, Dial-Up passwords, WebServices passwords, etc.) • Email Addresses (Might be used for spamming, as explained above) • Work Projects (Steal your presentations and work related papers) • Children's names/pictures, Ages (paedophile attacker?!) • School work (steal your papers and publish them with his/her name on it)
SOME WELL KNOWN TROJAN • NetBus • Beast • SubSeven • BOXP
SERVER SETUP FOR NETBUS
CONSEQUENCES OF A TROJAN HORSE • It will cause your computer to run slow • All of your personal data can be stolen or corrupted. • When you open a program it will continue to open programs on its own.
HOW TO PREVENT • Anti-Virus (AV) Scanners • Anti-Trojan Software • E.g Trojan Elite, Trojan Killer. • Clean Yourself • Online Scanning Services
CONCLUSION • In this seminar we have learned what is Trojan and all the functionality and aspects of the Trojan horse.
REFERENCES 1. Hacking tools & techniques and Incident handling, NIIT by prentice-hall INDIA(2005) 2. Denial of Service Attacks (2001). Retrieved May 20, 2004, from http://www.cert.org/tech_tips/denial_of_service.html. 3. http://www.windowsecurity.com/Trojan_horse
Discrete element method modelling (DEM) has proven over many years to be a powerfu...
Segregation Testing to confirm packer isolation and well integrity. Monitor w...
A small presentation of History matching and a case study on it. Also on Gas mater...
Trojan Horse consists of four day foundational workshops to give people hands-on experience with the Trojan Horse Method.
Important..! Some latest information/details about seminar on spyware and trojan horse is Hidden .. Please click here Do You Want To See More Details About ...
Trojan Horse is a revolutionary trial skills program that trains you to win in the courtroom. You will learn how to develop the emotional core of your case ...
Turkey’s Trojan Horse on Cyprus: The Poisoned Fruit from the Supreme Crime of Aggression
TROJAN HORSES : A seminar about TROJAN HORSES ... Abstract A Trojan Horse is a one which pretend to be useful programs but do some unwanted action.
Trojan Horse Method, Los Angeles, California. 938 likes · 4 talking about this. Trojan Horse is a trial skills program that can, in 4 days, break your...
1 - Abstract. This seminar covers a contemporary issue in Computer Security; Spyware and Trojan Horses. These are separate security threats to networked ...
How to Get Rid of Trojan Horses. A Trojan horse virus is a malware program that attaches itself to an innocuous file and embeds itself in your system.