Your SlideShare is downloading. ×
0
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Trojan
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Trojan

1,167

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,167
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
75
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. TROJAN <br />BY <br />G.Balakrishnaprasad<br />08885A0402<br />
  • 2. Out line<br />INTRODUCTION<br />TYPES OF TROJANS<br />WORKING OF TROJAN<br />HACKING REMOTE COMPUTER <br />TROJAN ATTACKS<br />INERNET SECURITY<br />SECURING CORPORATE NETWORK<br />SECURING PERSONAL COMPUTER<br />NETWORK THREATS & COUNTERMEASURES<br />HOST THREATS AND COUNTERMEASURES<br />CONCLUSION<br />REFERENCE<br />
  • 3. INTRODUCTION<br />What is trojan<br />Basically trojan is a Program used to gain access the victims computers.<br /> Fully Controls the victims Computer<br />Used to hack the remote Computer<br />
  • 4. Types of Trojans<br />Remote Access Trojans<br />Password Sending Trojans<br />KeyLoggers<br />Destructive Trojans<br />Denial of Service (DoS) Attack Trojans<br />Proxy/Wingate Trojans<br />FTP Trojans<br />
  • 5. Working of the Trojan<br />Trojan has 2 Components<br /> * A Client Component<br /> * A Server Component<br />Server part get installed in victims Computer<br />Client Program operated by attacker<br />
  • 6. Hacking the Remote Computer<br />Attacker tries to install the server part in victims Computer<br />Attacker gets the ip address and port number of the victims computer<br />Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)<br />
  • 7. Trojan Attacks<br />Trojan attacks are very simple and easy to execute<br />Zeus trojans are used to attack the Corporate<br />Network <br />Zeus trojans Spread through e-mail <br />
  • 8. Internet Security<br />Internet security means hiding our identity behind the network. <br />i.e. hiding ip address and hiding mac address.<br />Use proxy servers for browsing any websites<br />Use a addon in Mozilla called tor<br />
  • 9. Security to the Corporate Network<br />Network security is the process of preventing and detecting unauthorized use of your computer<br />Use a Licensed antivirus software<br />System admin should Check the log file<br />Sessions should be sniffed<br />Good to have a honey-pot system<br />
  • 10. Security to the Personal Computer<br />Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer.<br />Update and tighten Windows before installing new security software<br />To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.<br />
  • 11. Network Threats and Countermeasures<br />Information gathering<br />Sniffing <br />Spoofing<br />Session hijacking<br />Denial of service<br />
  • 12. Host Threats and Countermeasures<br />Viruses, Trojan horses, and worms<br />Foot printing<br />Profiling<br />Password cracking<br />Denial of service<br />Arbitrary code execution<br />Unauthorized access<br />
  • 13. CONCLUSION<br />Securing the personal computer from being hacked is very important issue.<br />The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service.<br />The task of this Trojan is to steal users personal data.<br />
  • 14. REFERENCE<br />http://www.irchelp.org/irchelp/security/trojanterms.html<br />http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true<br />http://www.sometips.com/tips/security/189.htm<br />http://www.staysafeonline.info/news/safety_study_v04.pdf<br />http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1<br />www.hackproof.tk<br />www.ciscopress.com <br />www.windowssecurity.com<br />www.foundstone.com<br />www.sourseforge.net<br />www.itsecurity.com<br />www.netstumbler.com<br />www.insecure.org<br />
  • 15. QUARIES???<br />

×