SlideShare a Scribd company logo
1 of 17
TROJAN HORSE VIRUS
D E V A K A B A R I
2 0 S S 0 2 I T 0 0 1
Y
2 0 s s 0 2 i t 0 2 7
INDEX
Introducation
What is Trojon?
How its work ?
Tasks of the Trojon
Trojan horse built for what?
Protect yourself
Conclusion
Reference
INTRODUCTION
 software which is specifically
designed to disrupt, damage, or
gain authorized access to a
computer system.
2 0 s s 0 2 i t 0 2 7
What is Malware?
THE MOST
DANGEROUS
COMPUTER
MALWARE
TROJAN HORSE
Is the computer
virus that is created
by hackers and
attackers and it’s
dangerous virus.”
TrojanHorse
“TrojanHorse
2 0 s s 0 2 i t 0 2 7
HOW ITS WORK ???
1
2
3
Nothing But a Server Client
Program
Uses TCP/IP protocol as well as UDP
protocol
It is only be send to the target system
by user interaction only.
How its work?
Trojans are also known to create a
backdoor on your computer that
gives malicious users access to
your system, possibly allowing
confidential or personal
information to be compromised.
Unlike other viruses and worms,
Trojans do not reproduce by
infecting other files nor do they
self-replicate.
2 0 s s 0 2 i t 0 2 7
Trojan virus only works on
WINDOWS ANDROID
2 0 s s 0 2 i t 0 2 7
TASKS OF TROJAN
• Erasing or overwriting data on a computer
• Corrupting files in a subtle way
• Spreading other malware, such as viruses. In this case the
Trojan horse is called a 'dropper'.
• To launch DDoS attacks or send Spam.
• logging keystrokes to steal information such as
passwords and credit card numbers (known as a key logger)
• Phish for bank or other account details, which can be used
for criminal activities.
• Shutting down the windows and rebooting of windows etc.
2 0 s s 0 2 i t 0 2 7
TROJANHORSE BUILT FOR
WHAT?
Credit cards
and master
cards..etc
Email
addresses
Work
projects
Photos
And
other files
2 0 s s 0 2 i t 0 2 7
Don’t open
unknown links
Don’t connect
unknown USB
and other
connecters
Don’t open
any offers in
sites
Delete
unwanted old
files
use best
Trojan
Remover
Software
use best
antivirus
software. E.x
Avast is the
best
PROTECT YOUR SELF
 protect your computer from Trojan?
Remote
Access
Trojans
Denial Of
Service (DoS)
Attack Trojans
Password
Sending
Trojans
Keylogger
s
TROJAN VARIATIONS
2 0 s s 0 2 i t 0 2 7
WHAT IS ATTACKER LOOKING FOR ?
• Credit Card Information: (often used for domain registration, shopping with your credit card)
• Any accounting data: (E-mail passwords, Dial-Up passwords, WebServices
passwords, etc.)
• Email Addresses :(Might be used for spamming, as explainedabove)
• Work Projects: (Steal your presentations and work related papers)
• Children's names/pictures, Ages: (paedophileattacker?!)
• School work: (steal your papers and publish them with his/her name on it)
2 0 s s 0 2 i t 0 2 7
RESULTES OF A TROJAN HORSE
• It will cause your computer to run slow
• All of your personal data can be stolen or corrupted.
• When you open a program it will continue to open programs on its own.
2 0 s s 0 2 i t 0 2 7
SOME WELL KNOWN TROJAN
• NetBus
• Beast
• SubSeven
• BOX-P 2 0 s s 0 2 i t 0 2 7
CONCLUSION
• In this seminar we have learned what is Trojan and all
the functionality and aspects of the Trojan horse.
2 0 s s 0 2 i t 0 2 7
T h e N e w P r e s e n t
REFERENCES
1. Hacking tools & techniques and Incident handling, NIIT by prentice hall INDIA(2005)
2. Denial of Service Attacks (2001). Retrieved May 20, 2004, from
http://www.cert.org/tech_tips/denial_of_service.html.
3. http://www.windowsecurity.com/Trojan_horse
THANK YOU
2 0 s s 0 2 i t 0 2 7

More Related Content

What's hot

password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?Bibek Sharma
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attackdoiss delhi
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3gpioa
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Studysecurityxploded
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 

What's hot (20)

password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Internet threats
Internet threatsInternet threats
Internet threats
 
Password Attack
Password Attack Password Attack
Password Attack
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Malware
MalwareMalware
Malware
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Ransomware Attack
Ransomware AttackRansomware Attack
Ransomware Attack
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ransomware
RansomwareRansomware
Ransomware
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 

Similar to TrojanHorse - Understanding the Most Dangerous Computer Malware

Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagarNitish Nagar
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptxothmanomar13
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoorsseth edmond
 
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...InfosecTrain Education
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptxFaith Shimba
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 

Similar to TrojanHorse - Understanding the Most Dangerous Computer Malware (20)

Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Meeting02_RoT.pptx
Meeting02_RoT.pptxMeeting02_RoT.pptx
Meeting02_RoT.pptx
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
Trojan viruses: Digital foes with deceptive tactics. Stealthy and cunning, th...
 
Trojan Viruses
Trojan VirusesTrojan Viruses
Trojan Viruses
 
trojan virus.pdf
trojan virus.pdftrojan virus.pdf
trojan virus.pdf
 
Trojan Viruses.pdf
Trojan Viruses.pdfTrojan Viruses.pdf
Trojan Viruses.pdf
 
C 7
C 7C 7
C 7
 
Malwares
MalwaresMalwares
Malwares
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ransomware
RansomwareRansomware
Ransomware
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

TrojanHorse - Understanding the Most Dangerous Computer Malware

  • 1. TROJAN HORSE VIRUS D E V A K A B A R I 2 0 S S 0 2 I T 0 0 1 Y
  • 2. 2 0 s s 0 2 i t 0 2 7 INDEX Introducation What is Trojon? How its work ? Tasks of the Trojon Trojan horse built for what? Protect yourself Conclusion Reference
  • 3. INTRODUCTION  software which is specifically designed to disrupt, damage, or gain authorized access to a computer system. 2 0 s s 0 2 i t 0 2 7 What is Malware?
  • 4. THE MOST DANGEROUS COMPUTER MALWARE TROJAN HORSE Is the computer virus that is created by hackers and attackers and it’s dangerous virus.” TrojanHorse “TrojanHorse 2 0 s s 0 2 i t 0 2 7
  • 5. HOW ITS WORK ??? 1 2 3 Nothing But a Server Client Program Uses TCP/IP protocol as well as UDP protocol It is only be send to the target system by user interaction only.
  • 6. How its work? Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike other viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. 2 0 s s 0 2 i t 0 2 7
  • 7. Trojan virus only works on WINDOWS ANDROID 2 0 s s 0 2 i t 0 2 7
  • 8. TASKS OF TROJAN • Erasing or overwriting data on a computer • Corrupting files in a subtle way • Spreading other malware, such as viruses. In this case the Trojan horse is called a 'dropper'. • To launch DDoS attacks or send Spam. • logging keystrokes to steal information such as passwords and credit card numbers (known as a key logger) • Phish for bank or other account details, which can be used for criminal activities. • Shutting down the windows and rebooting of windows etc. 2 0 s s 0 2 i t 0 2 7
  • 9. TROJANHORSE BUILT FOR WHAT? Credit cards and master cards..etc Email addresses Work projects Photos And other files 2 0 s s 0 2 i t 0 2 7
  • 10. Don’t open unknown links Don’t connect unknown USB and other connecters Don’t open any offers in sites Delete unwanted old files use best Trojan Remover Software use best antivirus software. E.x Avast is the best PROTECT YOUR SELF  protect your computer from Trojan?
  • 11. Remote Access Trojans Denial Of Service (DoS) Attack Trojans Password Sending Trojans Keylogger s TROJAN VARIATIONS 2 0 s s 0 2 i t 0 2 7
  • 12. WHAT IS ATTACKER LOOKING FOR ? • Credit Card Information: (often used for domain registration, shopping with your credit card) • Any accounting data: (E-mail passwords, Dial-Up passwords, WebServices passwords, etc.) • Email Addresses :(Might be used for spamming, as explainedabove) • Work Projects: (Steal your presentations and work related papers) • Children's names/pictures, Ages: (paedophileattacker?!) • School work: (steal your papers and publish them with his/her name on it) 2 0 s s 0 2 i t 0 2 7
  • 13. RESULTES OF A TROJAN HORSE • It will cause your computer to run slow • All of your personal data can be stolen or corrupted. • When you open a program it will continue to open programs on its own. 2 0 s s 0 2 i t 0 2 7
  • 14. SOME WELL KNOWN TROJAN • NetBus • Beast • SubSeven • BOX-P 2 0 s s 0 2 i t 0 2 7
  • 15. CONCLUSION • In this seminar we have learned what is Trojan and all the functionality and aspects of the Trojan horse. 2 0 s s 0 2 i t 0 2 7
  • 16. T h e N e w P r e s e n t REFERENCES 1. Hacking tools & techniques and Incident handling, NIIT by prentice hall INDIA(2005) 2. Denial of Service Attacks (2001). Retrieved May 20, 2004, from http://www.cert.org/tech_tips/denial_of_service.html. 3. http://www.windowsecurity.com/Trojan_horse
  • 17. THANK YOU 2 0 s s 0 2 i t 0 2 7