Trojan
Click here to load reader
-
Upload
belcy-d-mathews -
Category
Education
-
view
1.360 -
download
0
Transcript of Trojan
![Page 1: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/1.jpg)
TROJAN
BY G.Balakrishnaprasad08885A0402
![Page 2: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/2.jpg)
Out line
• INTRODUCTION• TYPES OF TROJANS• WORKING OF TROJAN• HACKING REMOTE COMPUTER • TROJAN ATTACKS• INERNET SECURITY• SECURING CORPORATE NETWORK• SECURING PERSONAL COMPUTER• NETWORK THREATS & COUNTERMEASURES• HOST THREATS AND COUNTERMEASURES• CONCLUSION• REFERENCE
![Page 3: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/3.jpg)
INTRODUCTION
• What is trojan• Basically trojan is a Program used to gain access the
victims computers.• Fully Controls the victims Computer• Used to hack the remote Computer
![Page 4: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/4.jpg)
Types of Trojans
• Remote Access Trojans• Password Sending Trojans• KeyLoggers• Destructive Trojans• Denial of Service (DoS) Attack Trojans• Proxy/Wingate Trojans• FTP Trojans
![Page 5: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/5.jpg)
Working of the Trojan
• Trojan has 2 Components* A Client Component* A Server Component
• Server part get installed in victims Computer• Client Program operated by attacker
![Page 6: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/6.jpg)
Hacking the Remote Computer
• Attacker tries to install the server part in victims Computer
• Attacker gets the ip address and port number of the victims computer
• Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
![Page 7: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/7.jpg)
Trojan Attacks
• Trojan attacks are very simple and easy to execute• Zeus trojans are used to attack the CorporateNetwork • Zeus trojans Spread through e-mail
![Page 8: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/8.jpg)
Internet Security
• Internet security means hiding our identity behind the network.
i.e. hiding ip address and hiding mac address.• Use proxy servers for browsing any websites• Use a addon in Mozilla called tor
![Page 9: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/9.jpg)
Security to the Corporate Network
• Network security is the process of preventing and detecting unauthorized use of your computer
• Use a Licensed antivirus software• System admin should Check the log file• Sessions should be sniffed• Good to have a honey-pot system
![Page 10: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/10.jpg)
Security to the Personal Computer
• Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer.
• Update and tighten Windows before installing new security software
• To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
![Page 11: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/11.jpg)
Network Threats and Countermeasures
• Information gathering• Sniffing • Spoofing• Session hijacking• Denial of service
![Page 12: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/12.jpg)
Host Threats and Countermeasures
• Viruses, Trojan horses, and worms• Foot printing• Profiling• Password cracking• Denial of service• Arbitrary code execution• Unauthorized access
![Page 13: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/13.jpg)
CONCLUSION
• Securing the personal computer from being hacked is very important issue.
• The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service.
• The task of this Trojan is to steal users personal data.
![Page 14: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/14.jpg)
REFERENCE
• http://www.irchelp.org/irchelp/security/trojanterms.html• http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true• http://www.sometips.com/tips/security/189.htm• http://www.staysafeonline.info/news/safety_study_v04.pdf• http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1 • www.hackproof.tk• www.ciscopress.com • www.windowssecurity.com • www.foundstone.com• www.sourseforge.net• www.itsecurity.com• www.netstumbler.com• www.insecure.org
![Page 15: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/15.jpg)
QUARIES???
![Page 16: Trojan](https://reader038.fdocuments.us/reader038/viewer/2022102323/554a0b62b4c9055c598b45ba/html5/thumbnails/16.jpg)