Featured post

DDos Attack With Kali Linux [Websploit]

Hello Guys This is me Hackers Creed and Today We are going To learn  about how to create and Dos attack against Webserver with the help of ...

16 Dec 2015

TROJENS - [ everything about computer trojens ]

Hello guyz today we are going to learn about Trojans
In this Topic we will learn

  • Definition of Trojans
  • What are trojans
  • Types of Trojans
  • How Trojans Work
  • How to Be Protected   
Now Lets Start With a Definition



Definition

A Trojan is a malicious program misguided as some very important application. Trojans comes on the backs of other
programs and are installed on a system without the User’s knowledge. Trojans are malicious pieces of code used to install
hacking software on a target system and aid the Hacker in gaining and retaining access to that system. Trojans and their
counterparts are important pieces of the Hacker’s tool-kit

 What are Trojans 

Trojans is a program that appears to perform a desirable and necessary function but that, because of hidden and
unauthorized code, performs functions unknown and unwanted by the user. These downloads are fake programs which
seems to be a original application, it may be a software like monitoring program, system virus scanners, registry cleaners,
computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc

Types of Trojans

There are many types of Trojans like:
  • RAT [remote administration tool] 
 RAT is a Trojan which is used to gain an unauthorized access to the vimtims 
system it works as simple client server networks it creates and uniques and stealth link from victims computer with hackers computer from which a malicious hacker can send commands to a OS to perform many tasks like stealing sensitive information and creating and Dos attacks from an victims computer
  • Data stealing Trojans
Data stealing Trojans are programmed in such a way that whenever
Trojan is started in victims computer it send a particular file and data from victims computer to an attacker pc . The main purpose of a Data stealing
Trojan is to Stealing a sensitive information form victims PC.
  • Security Disabler Trojans 
as we know as much as the as the security is installed in the  victims pc its more diffucult to hack into that system so security disabler Trojan are used in such a way that it disables the Main security source of a system and makes it Vulnerable to the hacker so the Hacker can hack into that system .

 How Trojans Work

lets us understand it in various steps
  • The hacker creates an Trojan  Executable file
  • Hacker use Some social Eng tricks to make victim execute the file in his/her system/pc
  • Hacker connects to victims PC
  • Steals data,crendial information etc etc what attacker wants to do
  • Creats Backdoor For feature access
This is how the Trojan works and how the hackers can steal an sensitive information with the help of the Trojan viruses

  How to Be Protected

TCP View is a Windows program that will show you detailed listings of all TCP (Transmission Control Protocol) and UDP
(User Datagram Protocol) endpoints on your system, including the local and remote addresses and state of TCP
connections.
• On Windows NT, 2000, and XP, TCP View also reports the name of the process that owns the endpoint.
• Active connections will appear in Green Color. You can always Right Click on the check the properties of the application.
• Once you have got hold of the Trojan application, you can Kill the active connection and the running process and then
delete the physical application file. This will make you recover from the attack of Trojan.

 

No comments:

Post a Comment