Your SlideShare is downloading. ×
  • Like
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Quan Tri Mang

Quan Tri Mang

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. Trojan and Backdoor
    • Teams Group
      • - Nguyễn Mạnh Cường
      • - Nguyễn Hoàng Hoàn
      • - Cao Văn Tân
      • - Nguyễn Trung Tín
    Giáo viên hướng dẫn: - Phạm Văn Tính
  • 2.  
  • 3. Introduction
    • - What ‘s Trojan ?: It’s a program runs hidden on an infected computer
    • - What’s A backdoor ?:It is any type of program that will allow a hacker to connect to a computer without going through the normal authentication process
    • - What’s is used ?: allow a hacker remote access to your system, start a keystroke logger to record your every keystroke, plant a backdoor on your system, cause a DoS , or even disable your antivirus protection or software firewall.
  • 4. Trojan Types
  • 5. Trojan Infection Mechanisms
  • 6. Distributing Trojans
    • - Wrapper: A wrapper is a program used to combine two or more executables into a single packaged program.
  • 7. Change icon, defacing application
  • 8. Infecting via CD-ROM, USB
    • An Autorun.inf file
    • [ autorun]
      • open=setup.exe
      • icon=setup.exe
    • Turn off the Auto-Start functionality by doing the following:
    • Start button-> Settings-> Control Panel-> System-> Device Manager-> CDROM-> Properties -> Settings
  • 9. Hacking Tool
    • Firekiller 2000 : will kill (if executed) any resistant protection software.
    • ICMP Tunneling
    • Reverse WWW Shell
    ICMP Tunneling
  • 10. Backdoor, Trojan Countermeasures
    • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
    • Educate your users not to install applications downloaded from the internet and e-mail attachments.
  • 11. Process Viewer
  • 12.
    • Tripwire : Tripwire will automatically calculate cryptographic hashes of all key system files or any file that you want to monitor for modifications.
    • Netstat:
  • 13. How to avoid a Trojan infection
  • 14. How to avoid a Trojan infection
  • 15. How to avoid a Trojan infection