SlideShare une entreprise Scribd logo
1  sur  16
TROJAN	 BY  G.Balakrishnaprasad 08885A0402
Out line INTRODUCTION TYPES OF TROJANS WORKING OF TROJAN HACKING REMOTE COMPUTER  TROJAN ATTACKS INERNET SECURITY SECURING CORPORATE NETWORK SECURING PERSONAL COMPUTER NETWORK THREATS & COUNTERMEASURES HOST THREATS AND COUNTERMEASURES CONCLUSION REFERENCE
INTRODUCTION What is trojan Basically trojan is a Program used to gain access the victims computers.  Fully Controls the victims Computer Used to hack the remote Computer
Types of Trojans Remote Access Trojans Password Sending Trojans KeyLoggers Destructive Trojans Denial of Service (DoS) Attack Trojans Proxy/Wingate Trojans FTP Trojans
Working of the Trojan Trojan has 2 Components 		* A Client Component 		* A Server Component Server part get installed in victims Computer Client Program operated by attacker
Hacking the Remote Computer Attacker tries to install the server part in victims Computer Attacker gets the ip address and port number of the victims computer Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
Trojan Attacks Trojan attacks are very simple and easy to execute Zeus trojans are used to attack the Corporate Network  Zeus trojans Spread through e-mail
Internet Security Internet security means hiding our identity behind the network.  i.e. hiding ip address and hiding mac address. Use proxy servers for browsing any websites Use a addon in Mozilla called tor
Security to the Corporate Network Network security is the process of preventing and detecting unauthorized use of your computer Use a Licensed antivirus software System admin should Check the log file Sessions should be sniffed Good to have a honey-pot system
Security to the Personal Computer Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer. Update and tighten Windows before installing new security software To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
Network Threats and Countermeasures Information gathering Sniffing  Spoofing Session hijacking Denial of service
Host Threats and Countermeasures Viruses, Trojan horses, and worms Foot printing Profiling Password cracking Denial of service Arbitrary code execution Unauthorized access
CONCLUSION Securing the personal computer from being hacked is very important issue. The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service. The task of this Trojan is to steal users personal data.
REFERENCE http://www.irchelp.org/irchelp/security/trojanterms.html http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true http://www.sometips.com/tips/security/189.htm http://www.staysafeonline.info/news/safety_study_v04.pdf http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1 www.hackproof.tk www.ciscopress.com  www.windowssecurity.com www.foundstone.com www.sourseforge.net www.itsecurity.com www.netstumbler.com www.insecure.org
QUARIES???
Trojan

Contenu connexe

Tendances

Tendances (20)

Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Trojan
TrojanTrojan
Trojan
 
Trojan
TrojanTrojan
Trojan
 
Trojan
TrojanTrojan
Trojan
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
TIC
TICTIC
TIC
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Computer security
Computer securityComputer security
Computer security
 
Remove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYRemove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXY
 
Network security
Network securityNetwork security
Network security
 

Similaire à Trojan

Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Wail Hassan
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric VanderburgEric Vanderburg
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 

Similaire à Trojan (20)

It act seminar
It act seminarIt act seminar
It act seminar
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Mitppt
MitpptMitppt
Mitppt
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Dernier (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Trojan

  • 1. TROJAN BY G.Balakrishnaprasad 08885A0402
  • 2. Out line INTRODUCTION TYPES OF TROJANS WORKING OF TROJAN HACKING REMOTE COMPUTER TROJAN ATTACKS INERNET SECURITY SECURING CORPORATE NETWORK SECURING PERSONAL COMPUTER NETWORK THREATS & COUNTERMEASURES HOST THREATS AND COUNTERMEASURES CONCLUSION REFERENCE
  • 3. INTRODUCTION What is trojan Basically trojan is a Program used to gain access the victims computers. Fully Controls the victims Computer Used to hack the remote Computer
  • 4. Types of Trojans Remote Access Trojans Password Sending Trojans KeyLoggers Destructive Trojans Denial of Service (DoS) Attack Trojans Proxy/Wingate Trojans FTP Trojans
  • 5. Working of the Trojan Trojan has 2 Components * A Client Component * A Server Component Server part get installed in victims Computer Client Program operated by attacker
  • 6. Hacking the Remote Computer Attacker tries to install the server part in victims Computer Attacker gets the ip address and port number of the victims computer Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
  • 7. Trojan Attacks Trojan attacks are very simple and easy to execute Zeus trojans are used to attack the Corporate Network Zeus trojans Spread through e-mail
  • 8. Internet Security Internet security means hiding our identity behind the network. i.e. hiding ip address and hiding mac address. Use proxy servers for browsing any websites Use a addon in Mozilla called tor
  • 9. Security to the Corporate Network Network security is the process of preventing and detecting unauthorized use of your computer Use a Licensed antivirus software System admin should Check the log file Sessions should be sniffed Good to have a honey-pot system
  • 10. Security to the Personal Computer Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer. Update and tighten Windows before installing new security software To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
  • 11. Network Threats and Countermeasures Information gathering Sniffing Spoofing Session hijacking Denial of service
  • 12. Host Threats and Countermeasures Viruses, Trojan horses, and worms Foot printing Profiling Password cracking Denial of service Arbitrary code execution Unauthorized access
  • 13. CONCLUSION Securing the personal computer from being hacked is very important issue. The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service. The task of this Trojan is to steal users personal data.
  • 14. REFERENCE http://www.irchelp.org/irchelp/security/trojanterms.html http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true http://www.sometips.com/tips/security/189.htm http://www.staysafeonline.info/news/safety_study_v04.pdf http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1 www.hackproof.tk www.ciscopress.com  www.windowssecurity.com www.foundstone.com www.sourseforge.net www.itsecurity.com www.netstumbler.com www.insecure.org