Trojan

16

Click here to load reader

Transcript of Trojan

Page 1: Trojan

TROJAN

BY G.Balakrishnaprasad08885A0402

Page 2: Trojan

Out line

• INTRODUCTION• TYPES OF TROJANS• WORKING OF TROJAN• HACKING REMOTE COMPUTER • TROJAN ATTACKS• INERNET SECURITY• SECURING CORPORATE NETWORK• SECURING PERSONAL COMPUTER• NETWORK THREATS & COUNTERMEASURES• HOST THREATS AND COUNTERMEASURES• CONCLUSION• REFERENCE

Page 3: Trojan

INTRODUCTION

• What is trojan• Basically trojan is a Program used to gain access the

victims computers.• Fully Controls the victims Computer• Used to hack the remote Computer

Page 4: Trojan

Types of Trojans

• Remote Access Trojans• Password Sending Trojans• KeyLoggers• Destructive Trojans• Denial of Service (DoS) Attack Trojans• Proxy/Wingate Trojans• FTP Trojans

Page 5: Trojan

Working of the Trojan

• Trojan has 2 Components* A Client Component* A Server Component

• Server part get installed in victims Computer• Client Program operated by attacker

Page 6: Trojan

Hacking the Remote Computer

• Attacker tries to install the server part in victims Computer

• Attacker gets the ip address and port number of the victims computer

• Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)

Page 7: Trojan

Trojan Attacks

• Trojan attacks are very simple and easy to execute• Zeus trojans are used to attack the CorporateNetwork • Zeus trojans Spread through e-mail

Page 8: Trojan

Internet Security

• Internet security means hiding our identity behind the network.

i.e. hiding ip address and hiding mac address.• Use proxy servers for browsing any websites• Use a addon in Mozilla called tor

Page 9: Trojan

Security to the Corporate Network

• Network security is the process of preventing and detecting unauthorized use of your computer

• Use a Licensed antivirus software• System admin should Check the log file• Sessions should be sniffed• Good to have a honey-pot system

Page 10: Trojan

Security to the Personal Computer

• Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer.

• Update and tighten Windows before installing new security software

• To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.

Page 11: Trojan

Network Threats and Countermeasures

• Information gathering• Sniffing • Spoofing• Session hijacking• Denial of service

Page 12: Trojan

Host Threats and Countermeasures

• Viruses, Trojan horses, and worms• Foot printing• Profiling• Password cracking• Denial of service• Arbitrary code execution• Unauthorized access

Page 13: Trojan

CONCLUSION

• Securing the personal computer from being hacked is very important issue.

• The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service.

• The task of this Trojan is to steal users personal data.

Page 14: Trojan

REFERENCE

• http://www.irchelp.org/irchelp/security/trojanterms.html• http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true• http://www.sometips.com/tips/security/189.htm• http://www.staysafeonline.info/news/safety_study_v04.pdf• http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1 • www.hackproof.tk• www.ciscopress.com • www.windowssecurity.com • www.foundstone.com• www.sourseforge.net• www.itsecurity.com• www.netstumbler.com• www.insecure.org

Page 15: Trojan

QUARIES???

Page 16: Trojan