2. 2 0 s s 0 2 i t 0 2 7
INDEX
Introducation
What is Trojon?
How its work ?
Tasks of the Trojon
Trojan horse built for what?
Protect yourself
Conclusion
Reference
3. INTRODUCTION
software which is specifically
designed to disrupt, damage, or
gain authorized access to a
computer system.
2 0 s s 0 2 i t 0 2 7
What is Malware?
5. HOW ITS WORK ???
1
2
3
Nothing But a Server Client
Program
Uses TCP/IP protocol as well as UDP
protocol
It is only be send to the target system
by user interaction only.
6. How its work?
Trojans are also known to create a
backdoor on your computer that
gives malicious users access to
your system, possibly allowing
confidential or personal
information to be compromised.
Unlike other viruses and worms,
Trojans do not reproduce by
infecting other files nor do they
self-replicate.
2 0 s s 0 2 i t 0 2 7
8. TASKS OF TROJAN
• Erasing or overwriting data on a computer
• Corrupting files in a subtle way
• Spreading other malware, such as viruses. In this case the
Trojan horse is called a 'dropper'.
• To launch DDoS attacks or send Spam.
• logging keystrokes to steal information such as
passwords and credit card numbers (known as a key logger)
• Phish for bank or other account details, which can be used
for criminal activities.
• Shutting down the windows and rebooting of windows etc.
2 0 s s 0 2 i t 0 2 7
9. TROJANHORSE BUILT FOR
WHAT?
Credit cards
and master
cards..etc
Email
addresses
Work
projects
Photos
And
other files
2 0 s s 0 2 i t 0 2 7
10. Don’t open
unknown links
Don’t connect
unknown USB
and other
connecters
Don’t open
any offers in
sites
Delete
unwanted old
files
use best
Trojan
Remover
Software
use best
antivirus
software. E.x
Avast is the
best
PROTECT YOUR SELF
protect your computer from Trojan?
12. WHAT IS ATTACKER LOOKING FOR ?
• Credit Card Information: (often used for domain registration, shopping with your credit card)
• Any accounting data: (E-mail passwords, Dial-Up passwords, WebServices
passwords, etc.)
• Email Addresses :(Might be used for spamming, as explainedabove)
• Work Projects: (Steal your presentations and work related papers)
• Children's names/pictures, Ages: (paedophileattacker?!)
• School work: (steal your papers and publish them with his/her name on it)
2 0 s s 0 2 i t 0 2 7
13. RESULTES OF A TROJAN HORSE
• It will cause your computer to run slow
• All of your personal data can be stolen or corrupted.
• When you open a program it will continue to open programs on its own.
2 0 s s 0 2 i t 0 2 7
14. SOME WELL KNOWN TROJAN
• NetBus
• Beast
• SubSeven
• BOX-P 2 0 s s 0 2 i t 0 2 7
15. CONCLUSION
• In this seminar we have learned what is Trojan and all
the functionality and aspects of the Trojan horse.
2 0 s s 0 2 i t 0 2 7
16. T h e N e w P r e s e n t
REFERENCES
1. Hacking tools & techniques and Incident handling, NIIT by prentice hall INDIA(2005)
2. Denial of Service Attacks (2001). Retrieved May 20, 2004, from
http://www.cert.org/tech_tips/denial_of_service.html.
3. http://www.windowsecurity.com/Trojan_horse