Trojan horse. In the context of computing and software, a Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as a computer virus. Contrary to popular belief, this action, usually encoded in a hidden payload, may or may not be actually malicious, but Trojan horses are notorious today for their use in the installation of backdoor programs. Simply put, a Trojan horse is not a computer virus. Unlike such malware, it does not propagate by self- replication but relies heavily on the exploitation of an end- user (see Social engineering). It is instead a categorical attribute which can encompass many different forms of codes. Therefore, a computer worm or virus may be a Trojan horse. The term is derived from the classical story of the Trojan Horse. In the field of computer architecture, 'Trojan Horse' can also refer to security loopholes that allow kernel code to access anything for which it is not authorized. Etymology. The word 'Trojan horse' is generally attributed to Daniel Edwards of the NSA. He is given credit for identifying the attack form in the report . Trojan malware takes its name from the classical story of the Trojan horse, because it imitates the technique to infect computers. A Trojan will hide within seemingly. What is a Trojan Virus? A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber. Norton.com > Viruses & Risks > Glossary > Trojan horse. Trojan horses are also known to create a. The Difference Between a Computer Virus, Worm and Trojan Horse. Best Answer: why create one when you can download one. You will need to gather some material first. Get a big pile of wood, some nails and a hammer. Are you curious to know about how to make a trojan horse on your own? This post will show you how to create a simple trojan horse using the C programming language. In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent. 1 WinShell program may be used to.After the Trojans brought the horse inside the city walls, the soldiers emerged, opened the gates to the Greek armies, and sacked the city of Troy. A very classic example is due to computer pioneer Ken Thompson in his 1. ACM Turing Award lecture. Thompson noted that it is possible to add code to the UNIX . Furthermore, Thompson argued, the C compiler itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. When run, it instead unloads hidden programs, commands, scripts, or any number of commands with or without the user's knowledge or consent. Malicious Trojan Horse programs are often used to circumvent protection systems in effect creating a vulnerable system to allow unauthorized access to the user's computer. Non- malicious Trojan Horse programs are used for managing systems, deploying software, surveillance, and forensics. Types of Trojan horse payloads. Trojan horse payloads are almost always designed to do various harmful things, but can also be harmless. They are broken down in classification based on how they breach and damage systems. The six main types of Trojan horse payloads are: * Remote Access* Data Destruction* Downloader* Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)* Security software disabler* Denial- of- service attack (Do. S)Some examples of damage are: * Erasing or overwriting data on a computer* Encrypting files in a cryptoviral extortion attack* Corrupting files in a subtle way* Upload and download files* Copying fake links, which lead to false websites, chats, or other account based websites, showing any local account name on the computer falsely engaging in untrue context* Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)* Spreading other malware, such as viruses: this type of Trojan horse is called a 'dropper' or 'vector'* Setting up networks of zombie computers in order to launch DDo. S attacks or send spam.* Spying on the user of a computer and covertly reporting data like browsing habits to other people (see the article on spyware)* Making screenshots* Logging keystrokes to steal information such as passwords and credit card numbers* Phishing for bank or other account details, which can be used for criminal activities* Installing a backdoor on a computer system* Opening and closing CD- ROM tray* Playing sounds, videos or displaying images.* Calling using the modem to expensive numbers, thus causing massive phone bills.* Harvesting e- mail addresses and using them for spam* Restarting the computer whenever the infected program is started* Deactivating or interfering with anti- virus and firewall programs* Deactivating or interfering with other competing forms of malware* Randomly shutting off the computer. Methods of infection. The majority of Trojan horse infections occur because the user was tricked into running an infected program. This is why it is advised not to open unexpected attachments on emails - - the program is often a cute animation or an image, but behind the scenes it infects the computer with a Trojan or worm. The infected program doesn't have to arrive via email; it can be sent in an Instant Message, downloaded from a Web site or by FTP, or even delivered on a CD, floppy disk, or USB thumb drive. However, receiving a Trojan in this manner is very rare. It is usually received through a download. Road apple. A . The attacker leaves a malware- infected floppy disc, CD ROM or USB flash drive in a location sure to be found or that is commonly visited, gives it a legitimate looking label and then waits in the hopes that someone will eventually use it. An example of this would be to get the corporate logo from the web site of the software that is infected and affixing a legitimate- looking label (e. The simplest responses involve clearing the temporary internet files on a computer, or finding the file and deleting it manually ( safe mode is recommended ). Normally, anti- virus software is able to detect and remove the trojan automatically. If the antivirus cannot find it, booting the computer from alternate media(cd) may allow an antivirus program to find a trojan and delete it. Updated anti- spyware programs are also very efficient against this threat. Disguises. Most varieties of Trojan horses are hidden on the computer without the user's awareness. Trojan horses sometimes use the Registry, adding entries that cause programs to run every time the computer boots up. Trojan horses may also work by combining with legitimate files on the computer. When the legitimate file is opened, the Trojan horse opens as well. List of trojan horses * AIDS * Back Orifice * Bandook * Beast Trojan * Bifrost * Downloader * Generic. LDI * Nuclear RAT (NR, Nuc. Rat) * Insurrection * Live Update * Leo. Srv * Look. 2Me * Optix Pro * Pigeon AXLM * Posion Ivy * Trojan. Qoologic - Key Logger * Trojan Luder - B * Shaft * shar. K * SHeur. ZSQ * Storm Trojan * Sub. Seven * Pro. Rat * Trojan. Bytesize? It uses material from the Wikipedia.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |