Your SlideShare is downloading. ×
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Trojan

1,160

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,160
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
75
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. TROJAN
    BY
    G.Balakrishnaprasad
    08885A0402
  • 2. Out line
    INTRODUCTION
    TYPES OF TROJANS
    WORKING OF TROJAN
    HACKING REMOTE COMPUTER
    TROJAN ATTACKS
    INERNET SECURITY
    SECURING CORPORATE NETWORK
    SECURING PERSONAL COMPUTER
    NETWORK THREATS & COUNTERMEASURES
    HOST THREATS AND COUNTERMEASURES
    CONCLUSION
    REFERENCE
  • 3. INTRODUCTION
    What is trojan
    Basically trojan is a Program used to gain access the victims computers.
    Fully Controls the victims Computer
    Used to hack the remote Computer
  • 4. Types of Trojans
    Remote Access Trojans
    Password Sending Trojans
    KeyLoggers
    Destructive Trojans
    Denial of Service (DoS) Attack Trojans
    Proxy/Wingate Trojans
    FTP Trojans
  • 5. Working of the Trojan
    Trojan has 2 Components
    * A Client Component
    * A Server Component
    Server part get installed in victims Computer
    Client Program operated by attacker
  • 6. Hacking the Remote Computer
    Attacker tries to install the server part in victims Computer
    Attacker gets the ip address and port number of the victims computer
    Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
  • 7. Trojan Attacks
    Trojan attacks are very simple and easy to execute
    Zeus trojans are used to attack the Corporate
    Network
    Zeus trojans Spread through e-mail
  • 8. Internet Security
    Internet security means hiding our identity behind the network.
    i.e. hiding ip address and hiding mac address.
    Use proxy servers for browsing any websites
    Use a addon in Mozilla called tor
  • 9. Security to the Corporate Network
    Network security is the process of preventing and detecting unauthorized use of your computer
    Use a Licensed antivirus software
    System admin should Check the log file
    Sessions should be sniffed
    Good to have a honey-pot system
  • 10. Security to the Personal Computer
    Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer.
    Update and tighten Windows before installing new security software
    To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
  • 11. Network Threats and Countermeasures
    Information gathering
    Sniffing
    Spoofing
    Session hijacking
    Denial of service
  • 12. Host Threats and Countermeasures
    Viruses, Trojan horses, and worms
    Foot printing
    Profiling
    Password cracking
    Denial of service
    Arbitrary code execution
    Unauthorized access
  • 13. CONCLUSION
    Securing the personal computer from being hacked is very important issue.
    The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service.
    The task of this Trojan is to steal users personal data.
  • 14. REFERENCE
    http://www.irchelp.org/irchelp/security/trojanterms.html
    http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true
    http://www.sometips.com/tips/security/189.htm
    http://www.staysafeonline.info/news/safety_study_v04.pdf
    http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1
    www.hackproof.tk
    www.ciscopress.com 
    www.windowssecurity.com
    www.foundstone.com
    www.sourseforge.net
    www.itsecurity.com
    www.netstumbler.com
    www.insecure.org
  • 15. QUARIES???

×