TROJAN	<br />BY <br />G.Balakrishnaprasad<br />08885A0402<br />
Out line<br />INTRODUCTION<br />TYPES OF TROJANS<br />WORKING OF TROJAN<br />HACKING REMOTE COMPUTER <br />TROJAN ATTACKS<...
INTRODUCTION<br />What is trojan<br />Basically trojan is a Program used to gain access the victims computers.<br /> Fully...
Types of Trojans<br />Remote Access Trojans<br />Password Sending Trojans<br />KeyLoggers<br />Destructive Trojans<br />De...
Working of the Trojan<br />Trojan has 2 Components<br />		* A Client Component<br />		* A Server Component<br />Server par...
Hacking the Remote Computer<br />Attacker tries to install the server part in victims Computer<br />Attacker gets the ip a...
Trojan Attacks<br />Trojan attacks are very simple and easy to execute<br />Zeus trojans are used to attack the Corporate<...
Internet Security<br />Internet security means hiding our identity behind the network. <br />i.e. hiding ip address and hi...
Security to the Corporate Network<br />Network security is the process of preventing and detecting unauthorized use of you...
Security to the Personal Computer<br />Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phish...
Network Threats and Countermeasures<br />Information gathering<br />Sniffing <br />Spoofing<br />Session hijacking<br />De...
Host Threats and Countermeasures<br />Viruses, Trojan horses, and worms<br />Foot printing<br />Profiling<br />Password cr...
CONCLUSION<br />Securing the personal computer from being hacked is very important issue.<br />The Trojan will either pene...
REFERENCE<br />http://www.irchelp.org/irchelp/security/trojanterms.html<br />http://www.microsoft.com/technet/security/top...
QUARIES???<br />
Trojan
Upcoming SlideShare
Loading in …5
×

Trojan

1,308 views
1,232 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,308
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
82
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Trojan

  1. 1. TROJAN <br />BY <br />G.Balakrishnaprasad<br />08885A0402<br />
  2. 2. Out line<br />INTRODUCTION<br />TYPES OF TROJANS<br />WORKING OF TROJAN<br />HACKING REMOTE COMPUTER <br />TROJAN ATTACKS<br />INERNET SECURITY<br />SECURING CORPORATE NETWORK<br />SECURING PERSONAL COMPUTER<br />NETWORK THREATS & COUNTERMEASURES<br />HOST THREATS AND COUNTERMEASURES<br />CONCLUSION<br />REFERENCE<br />
  3. 3. INTRODUCTION<br />What is trojan<br />Basically trojan is a Program used to gain access the victims computers.<br /> Fully Controls the victims Computer<br />Used to hack the remote Computer<br />
  4. 4. Types of Trojans<br />Remote Access Trojans<br />Password Sending Trojans<br />KeyLoggers<br />Destructive Trojans<br />Denial of Service (DoS) Attack Trojans<br />Proxy/Wingate Trojans<br />FTP Trojans<br />
  5. 5. Working of the Trojan<br />Trojan has 2 Components<br /> * A Client Component<br /> * A Server Component<br />Server part get installed in victims Computer<br />Client Program operated by attacker<br />
  6. 6. Hacking the Remote Computer<br />Attacker tries to install the server part in victims Computer<br />Attacker gets the ip address and port number of the victims computer<br />Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)<br />
  7. 7. Trojan Attacks<br />Trojan attacks are very simple and easy to execute<br />Zeus trojans are used to attack the Corporate<br />Network <br />Zeus trojans Spread through e-mail <br />
  8. 8. Internet Security<br />Internet security means hiding our identity behind the network. <br />i.e. hiding ip address and hiding mac address.<br />Use proxy servers for browsing any websites<br />Use a addon in Mozilla called tor<br />
  9. 9. Security to the Corporate Network<br />Network security is the process of preventing and detecting unauthorized use of your computer<br />Use a Licensed antivirus software<br />System admin should Check the log file<br />Sessions should be sniffed<br />Good to have a honey-pot system<br />
  10. 10. Security to the Personal Computer<br />Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer.<br />Update and tighten Windows before installing new security software<br />To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.<br />
  11. 11. Network Threats and Countermeasures<br />Information gathering<br />Sniffing <br />Spoofing<br />Session hijacking<br />Denial of service<br />
  12. 12. Host Threats and Countermeasures<br />Viruses, Trojan horses, and worms<br />Foot printing<br />Profiling<br />Password cracking<br />Denial of service<br />Arbitrary code execution<br />Unauthorized access<br />
  13. 13. CONCLUSION<br />Securing the personal computer from being hacked is very important issue.<br />The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service.<br />The task of this Trojan is to steal users personal data.<br />
  14. 14. REFERENCE<br />http://www.irchelp.org/irchelp/security/trojanterms.html<br />http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true<br />http://www.sometips.com/tips/security/189.htm<br />http://www.staysafeonline.info/news/safety_study_v04.pdf<br />http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1<br />www.hackproof.tk<br />www.ciscopress.com <br />www.windowssecurity.com<br />www.foundstone.com<br />www.sourseforge.net<br />www.itsecurity.com<br />www.netstumbler.com<br />www.insecure.org<br />
  15. 15. QUARIES???<br />

×