2. Out line INTRODUCTION TYPES OF TROJANS WORKING OF TROJAN HACKING REMOTE COMPUTER TROJAN ATTACKS INERNET SECURITY SECURING CORPORATE NETWORK SECURING PERSONAL COMPUTER NETWORK THREATS & COUNTERMEASURES HOST THREATS AND COUNTERMEASURES CONCLUSION REFERENCE
3. INTRODUCTION What is trojan Basically trojan is a Program used to gain access the victims computers. Fully Controls the victims Computer Used to hack the remote Computer
4. Types of Trojans Remote Access Trojans Password Sending Trojans KeyLoggers Destructive Trojans Denial of Service (DoS) Attack Trojans Proxy/Wingate Trojans FTP Trojans
5. Working of the Trojan Trojan has 2 Components * A Client Component * A Server Component Server part get installed in victims Computer Client Program operated by attacker
6. Hacking the Remote Computer Attacker tries to install the server part in victims Computer Attacker gets the ip address and port number of the victims computer Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
7. Trojan Attacks Trojan attacks are very simple and easy to execute Zeus trojans are used to attack the Corporate Network Zeus trojans Spread through e-mail
8. Internet Security Internet security means hiding our identity behind the network. i.e. hiding ip address and hiding mac address. Use proxy servers for browsing any websites Use a addon in Mozilla called tor
9. Security to the Corporate Network Network security is the process of preventing and detecting unauthorized use of your computer Use a Licensed antivirus software System admin should Check the log file Sessions should be sniffed Good to have a honey-pot system
10. Security to the Personal Computer Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer. Update and tighten Windows before installing new security software To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
11. Network Threats and Countermeasures Information gathering Sniffing Spoofing Session hijacking Denial of service
12. Host Threats and Countermeasures Viruses, Trojan horses, and worms Foot printing Profiling Password cracking Denial of service Arbitrary code execution Unauthorized access
13. CONCLUSION Securing the personal computer from being hacked is very important issue. The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service. The task of this Trojan is to steal users personal data.