Hello guyz today we are going to learn about Trojans
In this Topic we will learn
In this Topic we will learn
- Definition of Trojans
- What are trojans
- Types of Trojans
- How Trojans Work
- How to Be Protected
Definition
A Trojan is a malicious program misguided as some very important application. Trojans comes on the backs of other
programs and are installed on a system without the User’s knowledge. Trojans are malicious pieces of code used to install
hacking software on a target system and aid the Hacker in gaining and retaining access to that system. Trojans and their
counterparts are important pieces of the Hacker’s tool-kit
What are Trojans
Trojans is a program that appears to perform a desirable and necessary function but that, because of hidden and
unauthorized code, performs functions unknown and unwanted by the user. These downloads are fake programs which
seems to be a original application, it may be a software like monitoring program, system virus scanners, registry cleaners,
computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc
unauthorized code, performs functions unknown and unwanted by the user. These downloads are fake programs which
seems to be a original application, it may be a software like monitoring program, system virus scanners, registry cleaners,
computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc
Types of Trojans
There are many types of Trojans like:
- RAT [remote administration tool]
system it works as simple client server networks it creates and uniques and stealth link from victims computer with hackers computer from which a malicious hacker can send commands to a OS to perform many tasks like stealing sensitive information and creating and Dos attacks from an victims computer
- Data stealing Trojans
Data stealing Trojans are programmed in such a way that whenever
Trojan is started in victims computer it send a particular file and data from victims computer to an attacker pc . The main purpose of a Data stealing
Trojan is to Stealing a sensitive information form victims PC.
Trojan is started in victims computer it send a particular file and data from victims computer to an attacker pc . The main purpose of a Data stealing
Trojan is to Stealing a sensitive information form victims PC.
- Security Disabler Trojans
How Trojans Work
lets us understand it in various steps
- The hacker creates an Trojan Executable file
- Hacker use Some social Eng tricks to make victim execute the file in his/her system/pc
- Hacker connects to victims PC
- Steals data,crendial information etc etc what attacker wants to do
- Creats Backdoor For feature access
How to Be Protected
TCP View is a Windows program that will show you detailed listings of all TCP (Transmission Control Protocol) and UDP
(User Datagram Protocol) endpoints on your system, including the local and remote addresses and state of TCP
connections.
• On Windows NT, 2000, and XP, TCP View also reports the name of the process that owns the endpoint.
• Active connections will appear in Green Color. You can always Right Click on the check the properties of the application.
• Once you have got hold of the Trojan application, you can Kill the active connection and the running process and then
delete the physical application file. This will make you recover from the attack of Trojan.
No comments:
Post a Comment