Torjan horse virus

940 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
940
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
37
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Torjan horse virus

  1. 1. VIRUS  TROJAN HOURSE  PURPOSE AND USAGE  CURRENT USAGE  COMMON TROJANS HORSE  RECENT INNOVATION IN TROJAN  SECURITY FROM  TROJAN PROJECT INFORMATION 
  2. 2.  A computer virus is a computer program that replicate itself and spread from one computer to another.  The term "virus" is also erroneously, used to refer types of malware, including adware and spyware programs that don’t replicate .  Malware (malicious software) are used disrupt computer operation, gather sensitive information, or gain access to pc’s systems.  Many active malware threats are trojans or worms than viruses. Trojan horses and worms are confused with viruses.
  3. 3.       The term is derived from Greek mythology . Trojans are non-self-replicating type of malware which appears to perform a desirable function. Instead it facilitates unauthorized access to the user's computer system. Do not attempt to inject themselves into other files like computer virus. Trojans may use drive-by downloads or install via online games ,internet-driven applications In order to reach target computers.
  4. 4.             Trojan can hacker remote access to targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include: Use of the machine as part of a botnet. Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card information) Installation of software, including third-party malware and ransomware Downloading or uploading of files on the user's computer Modification or deletion of files Keystroke logging Watching the user's screen
  5. 5.       Botnets popularity and availability of advertising services permit authors to violate their users' privacy. Trojan horses are becoming more common. survey conducted by BitDefender (2009) "Trojan-type malware are 83-percent of the global. spreads with help of worms and travel across the internet with them. main purpose to make host system open to access through the internet. BitDefender states approximately 15% of computers are members of a botnet (Trojan infection)
  6. 6. Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus The Blackhole exploit kit[11] Flashback Trojan (Trojan BackDoor.Flashback)  ProRat  ZeroAccess       
  7. 7.       its code takes advantage of a security flaw of Internet Explorer and Google Chrome . use host computer as an anonymizer proxy to hide internet usage. hacker can view internet sites tracking cookies, internet history, any IP logging. host's computer may show the internet history using effected computer as proxy. Newer generations of Trojans tend to "cover" olders tracks leaving tracks on viewed page. the most widely distributed eg such type of Trojan horse are SUB7.
  8. 8. Use good antivirus  Always scan files emails before opening to your system  Trojans can be far more harmful than viruses,  Use trojans controllers.  Never open scam emails.  Delete .exe files not from authorized sites. 
  9. 9. Our project describes working of a simple trojan.  This trojan crupts window os .  It places junk file in c drive to fill hardisk space  Its undetected by antivirus  Damage can be restore by deleting .dll file from c drive. 

×