SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Trojan Horse:
Implementation and Prevention
Prepared By: PATEL BHAGYESH (120420704003)
RATHOD GAURANG (005)
PATEL PRIYANK (009)
What is a Malware ?
 Malware = Malicious + Software
 A Malware is a set of instructions that run on
your computer and make your system do
something that an attacker wants it to do.
Types of malware
 Virus
 Backdoor
 Trojan horse
 Rootkit
 Scareware
 Adware
 Worm
Malware according to spreading
Trojan Horse
 Agenda
 Introduction of Trojan Horse
 Objectives of Trojan Horse
 Types of Trojan Horses
 Trojan Horse Techniques
 Implementation with an example
 Prevention Methods
Trojan Horse Definition
 A Trojan describes the class of malware that
appears to perform a desirable function but in
fact performs undisclosed malicious functions
that allow unauthorized access to the victim
computer
Trojan Horse : Introduction
 A Trojan Horse program is a unique form of computer
attack that allows a remote user a means of gaining
access to a victim's machine without their knowledge.
 Trojan Horse initially appears to be harmless, but later
proves to be extremely destructive.
 Trojan Horse is not a Virus.
Trojan horses can exploit your system in various and creative ways
including:
 Creating a "backdoor" that allows remote access to control your
machine
 Recording keystrokes to steal credit card or password information
 Commandeering your system to distribute malware or spam to
other computers
 Spying on your activities by sending screenshots of your monitor
to a remote location
 Uploading or downloading files
 Erasing or overwriting data
Objectives of Trojan Horse Programs
Types of Trojan Horses
The EC Council groups Trojan horses into seven main types
 Remote Access Trojans
 Subseven
 Data Sending Trojans
 Eblaster
 Destructive Trojans
 Hard Disk Killer
 Proxy Trojans
 Troj/Proxy-GG
 FTP Trojans
 Trojan.Win32.FTP Attack
 security software disabler Trojans
 Trojan.Win32.Disabler.b
 denial-of-service attack (DoS) Trojans
 PC Cyborg Trojan
Trojan Horse Techniques
 Alter name of malicious code on system.
 Create a file name to obscure the file's type.
 just_text.txt.exe
 abcd.shs where by default the shs file will not be
displayed in the system"
Trojan Horse Techniques
 Create another file and process with same name eg. UNIX init
process.

Combine malicious code with an innocuous program
Implementation of a Trojan Horse
Program
Trojan.Gletta.A is a Trojan horse program that steals Internet banking
passwords. It logs keystrokes of a victim computer when the user visits
certain Web pages and then emails the log to the attacker.
1) Trojan.Gletta.A executable locates the System folder copies itself to the
system folder and the Windows installation folder.
 %System%Wmiprvse.exe
 %System%Ntsvc.exe
 %Windir%Userlogon.exe
2) Creates %System%Rsasec.dll, which is a key logger and %System
%rsacb.dll, which is actually a text file key logger file.
3) Adds a registry key value "wmiprvse.exe"="%system%wmiprvse.exe" , to
the registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun,
so that the Trojan runs when you start Windows.
Implementation of a Trojan Horse
Program
4) On Windows NT/2000/XP, it adds the value:
"Run" = "%Windir%userlogon.exe" to the registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWindows,
so that the Trojan runs when you start the operating systems.
The program watches for Internet Explorer windows that have any of the following titles:
 National Internet Banking
 Welcome to Citibank
 Bank of China
 HSBC in Hong Kong
or one of the following URLs:
 https:/ /olb.westpac.com.au/ib/asp/
 https:/ /olb.westpac.com.au/ib/
5) It also captures all the keystrokes entered into any windows that match those listed above, and
writes them into a log file.
6) Later it uses its own SMTP engine to send the log file to an external mail account of the intruder.
The mail has the following characteristics:
 Both the FROM and TO addresses have the domain "mail.ru"
 The subject starts with "Business News from"
Prevention of Trojan Horse Programs
 Install latest security patches for the operating system.
 Install Anti-Trojan software.
 Trojan Hunter
 A- Squared
 Install anti-virus software and update it regularly
 Install a secure firewall
 Do not give strangers access (remote as well as physical) to your computer.
 Do not run any unknown or suspicious executable program just to "check it
out".
 Scan all email attachments with an antivirus program before opening it.
Prevention of Trojan Horse Programs
 Do regular backup of your system.
 Do not use the features in programs that can automatically get or preview
files.
 Do not type commands that others tell you to type, or go to web addresses
mentioned by strangers.
 Never open instant message (IM) attachments from unknown people.
 Do not use peer-to-peer or P2P sharing networks, such as Kazaa, Limewire,
Gnutella, etc. as they do not filter out malicious programs hidden in shared
files.
 Educate your coworkers, employees, and family members about the effects
of Trojan Horse.
 Finally, protection from Trojans involves simple common sense
THANK YOU..

Weitere ähnliche Inhalte

Was ist angesagt?

Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and PreventionPratimesh Pathak
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)NamanKikani
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and AnalysisPrashant Chopra
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 

Was ist angesagt? (20)

Web Security
Web SecurityWeb Security
Web Security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Malicious
MaliciousMalicious
Malicious
 
Dos attack
Dos attackDos attack
Dos attack
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Malware Classification and Analysis
Malware Classification and AnalysisMalware Classification and Analysis
Malware Classification and Analysis
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 

Andere mochten auch

Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesMario Reascos
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attackguestc8c7c02bb
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horsesiti zulaikha
 
Trojan Horse
Trojan HorseTrojan Horse
Trojan Horseeleky
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.Anuj Khandelwal
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Viral gene therapy
Viral gene therapyViral gene therapy
Viral gene therapy15bunkal
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threadssrivijaymanickam
 

Andere mochten auch (20)

Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
The Trojan Horse
The Trojan HorseThe Trojan Horse
The Trojan Horse
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Computer worm
Computer wormComputer worm
Computer worm
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Types of security services
Types of security servicesTypes of security services
Types of security services
 
virus salami attack and trojan horse
virus salami attack and trojan horsevirus salami attack and trojan horse
virus salami attack and trojan horse
 
Trojan Horse
Trojan HorseTrojan Horse
Trojan Horse
 
Research Paper on Rootkit.
Research Paper on Rootkit.Research Paper on Rootkit.
Research Paper on Rootkit.
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Viral gene therapy
Viral gene therapyViral gene therapy
Viral gene therapy
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 

Ähnlich wie Trojan horse

Ähnlich wie Trojan horse (20)

Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Malwares
MalwaresMalwares
Malwares
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
It act seminar
It act seminarIt act seminar
It act seminar
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Malware
MalwareMalware
Malware
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Introduction to trojans and backdoors
Introduction to trojans and backdoorsIntroduction to trojans and backdoors
Introduction to trojans and backdoors
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 

Mehr von Gaurang Rathod

Resume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software DeveloperResume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software DeveloperGaurang Rathod
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnGaurang Rathod
 
Load balancing to extend life of wireless sensor network
Load balancing to extend life of wireless sensor networkLoad balancing to extend life of wireless sensor network
Load balancing to extend life of wireless sensor networkGaurang Rathod
 
Extend life of wireless sensor network
Extend life of wireless sensor networkExtend life of wireless sensor network
Extend life of wireless sensor networkGaurang Rathod
 
Energy management issues in lte.pptx
Energy management issues in lte.pptxEnergy management issues in lte.pptx
Energy management issues in lte.pptxGaurang Rathod
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkGaurang Rathod
 
Bcd counter with mode control & parallel load capability
Bcd counter with mode control & parallel load capabilityBcd counter with mode control & parallel load capability
Bcd counter with mode control & parallel load capabilityGaurang Rathod
 

Mehr von Gaurang Rathod (8)

Resume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software DeveloperResume of Gaurang Rathod, Embedded Software Developer
Resume of Gaurang Rathod, Embedded Software Developer
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsn
 
Load balancing to extend life of wireless sensor network
Load balancing to extend life of wireless sensor networkLoad balancing to extend life of wireless sensor network
Load balancing to extend life of wireless sensor network
 
Extend life of wireless sensor network
Extend life of wireless sensor networkExtend life of wireless sensor network
Extend life of wireless sensor network
 
Energy management issues in lte.pptx
Energy management issues in lte.pptxEnergy management issues in lte.pptx
Energy management issues in lte.pptx
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
 
Empolyee welfare
Empolyee welfareEmpolyee welfare
Empolyee welfare
 
Bcd counter with mode control & parallel load capability
Bcd counter with mode control & parallel load capabilityBcd counter with mode control & parallel load capability
Bcd counter with mode control & parallel load capability
 

Kürzlich hochgeladen

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 

Kürzlich hochgeladen (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 

Trojan horse

  • 1. Trojan Horse: Implementation and Prevention Prepared By: PATEL BHAGYESH (120420704003) RATHOD GAURANG (005) PATEL PRIYANK (009)
  • 2. What is a Malware ?  Malware = Malicious + Software  A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
  • 3. Types of malware  Virus  Backdoor  Trojan horse  Rootkit  Scareware  Adware  Worm
  • 5. Trojan Horse  Agenda  Introduction of Trojan Horse  Objectives of Trojan Horse  Types of Trojan Horses  Trojan Horse Techniques  Implementation with an example  Prevention Methods
  • 6. Trojan Horse Definition  A Trojan describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim computer
  • 7. Trojan Horse : Introduction  A Trojan Horse program is a unique form of computer attack that allows a remote user a means of gaining access to a victim's machine without their knowledge.  Trojan Horse initially appears to be harmless, but later proves to be extremely destructive.  Trojan Horse is not a Virus.
  • 8. Trojan horses can exploit your system in various and creative ways including:  Creating a "backdoor" that allows remote access to control your machine  Recording keystrokes to steal credit card or password information  Commandeering your system to distribute malware or spam to other computers  Spying on your activities by sending screenshots of your monitor to a remote location  Uploading or downloading files  Erasing or overwriting data Objectives of Trojan Horse Programs
  • 9. Types of Trojan Horses The EC Council groups Trojan horses into seven main types  Remote Access Trojans  Subseven  Data Sending Trojans  Eblaster  Destructive Trojans  Hard Disk Killer  Proxy Trojans  Troj/Proxy-GG  FTP Trojans  Trojan.Win32.FTP Attack  security software disabler Trojans  Trojan.Win32.Disabler.b  denial-of-service attack (DoS) Trojans  PC Cyborg Trojan
  • 10. Trojan Horse Techniques  Alter name of malicious code on system.  Create a file name to obscure the file's type.  just_text.txt.exe  abcd.shs where by default the shs file will not be displayed in the system"
  • 11. Trojan Horse Techniques  Create another file and process with same name eg. UNIX init process.  Combine malicious code with an innocuous program
  • 12. Implementation of a Trojan Horse Program Trojan.Gletta.A is a Trojan horse program that steals Internet banking passwords. It logs keystrokes of a victim computer when the user visits certain Web pages and then emails the log to the attacker. 1) Trojan.Gletta.A executable locates the System folder copies itself to the system folder and the Windows installation folder.  %System%Wmiprvse.exe  %System%Ntsvc.exe  %Windir%Userlogon.exe 2) Creates %System%Rsasec.dll, which is a key logger and %System %rsacb.dll, which is actually a text file key logger file. 3) Adds a registry key value "wmiprvse.exe"="%system%wmiprvse.exe" , to the registry key: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun, so that the Trojan runs when you start Windows.
  • 13. Implementation of a Trojan Horse Program 4) On Windows NT/2000/XP, it adds the value: "Run" = "%Windir%userlogon.exe" to the registry key: HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsNTCurrentVersionWindows, so that the Trojan runs when you start the operating systems. The program watches for Internet Explorer windows that have any of the following titles:  National Internet Banking  Welcome to Citibank  Bank of China  HSBC in Hong Kong or one of the following URLs:  https:/ /olb.westpac.com.au/ib/asp/  https:/ /olb.westpac.com.au/ib/ 5) It also captures all the keystrokes entered into any windows that match those listed above, and writes them into a log file. 6) Later it uses its own SMTP engine to send the log file to an external mail account of the intruder. The mail has the following characteristics:  Both the FROM and TO addresses have the domain "mail.ru"  The subject starts with "Business News from"
  • 14. Prevention of Trojan Horse Programs  Install latest security patches for the operating system.  Install Anti-Trojan software.  Trojan Hunter  A- Squared  Install anti-virus software and update it regularly  Install a secure firewall  Do not give strangers access (remote as well as physical) to your computer.  Do not run any unknown or suspicious executable program just to "check it out".  Scan all email attachments with an antivirus program before opening it.
  • 15. Prevention of Trojan Horse Programs  Do regular backup of your system.  Do not use the features in programs that can automatically get or preview files.  Do not type commands that others tell you to type, or go to web addresses mentioned by strangers.  Never open instant message (IM) attachments from unknown people.  Do not use peer-to-peer or P2P sharing networks, such as Kazaa, Limewire, Gnutella, etc. as they do not filter out malicious programs hidden in shared files.  Educate your coworkers, employees, and family members about the effects of Trojan Horse.  Finally, protection from Trojans involves simple common sense