PURPOSE AND USAGE
COMMON TROJANS HORSE
RECENT INNOVATION IN TROJAN
TROJAN PROJECT INFORMATION
A computer virus is a computer program that replicate
itself and spread from one computer to another.
The term "virus" is also erroneously, used to refer types
of malware, including adware and spyware programs
that don’t replicate .
Malware (malicious software) are used disrupt
computer operation, gather sensitive information, or
gain access to pc’s systems.
Many active malware threats are trojans or worms than
viruses. Trojan horses and worms are confused with
The term is derived from Greek mythology .
Trojans are non-self-replicating type of
malware which appears to perform a desirable
Instead it facilitates unauthorized access to the
user's computer system.
Do not attempt to inject themselves into other
files like computer virus.
Trojans may use drive-by downloads or install
via online games ,internet-driven applications
In order to reach target computers.
Trojan can hacker remote access to targeted computer
Operations that could be performed by a hacker on a
targeted computer system may include:
Use of the machine as part of a botnet.
Crashing the computer
Blue screen of death
Electronic money theft
Data theft (e.g. retrieving passwords or credit card
Installation of software, including third-party malware and
Downloading or uploading of files on the user's computer
Modification or deletion of files
Watching the user's screen
Botnets popularity and availability of advertising
services permit authors to violate their users' privacy.
Trojan horses are becoming more common.
survey conducted by BitDefender (2009) "Trojan-type
malware are 83-percent of the global.
spreads with help of worms and travel across the
internet with them.
main purpose to make host system open to access
through the internet.
BitDefender states approximately 15% of computers
are members of a botnet (Trojan infection)
Netbus (by Carl-Fredrik Neikter)
Subseven or Sub7(by Mobman)
Back Orifice (Sir Dystic)
The Blackhole exploit kit
Flashback Trojan (Trojan
its code takes advantage of a security flaw of
Internet Explorer and Google Chrome .
use host computer as an anonymizer proxy to
hide internet usage.
hacker can view internet sites tracking
cookies, internet history, any IP logging.
host's computer may show the internet history
using effected computer as proxy.
Newer generations of Trojans tend to "cover"
olders tracks leaving tracks on viewed page.
the most widely distributed eg such type of
Trojan horse are SUB7.
Use good antivirus
Always scan files emails before opening
to your system
Trojans can be far more harmful than
Use trojans controllers.
Never open scam emails.
Delete .exe files not from authorized sites.
Our project describes working of a
This trojan crupts window os .
It places junk file in c drive to fill hardisk
Its undetected by antivirus
Damage can be restore by deleting .dll
file from c drive.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.