SlideShare una empresa de Scribd logo
TROJAN	 BY  G.Balakrishnaprasad 08885A0402
Out line INTRODUCTION TYPES OF TROJANS WORKING OF TROJAN HACKING REMOTE COMPUTER  TROJAN ATTACKS INERNET SECURITY SECURING CORPORATE NETWORK SECURING PERSONAL COMPUTER NETWORK THREATS & COUNTERMEASURES HOST THREATS AND COUNTERMEASURES CONCLUSION REFERENCE
INTRODUCTION What is trojan Basically trojan is a Program used to gain access the victims computers.  Fully Controls the victims Computer Used to hack the remote Computer
Types of Trojans Remote Access Trojans Password Sending Trojans KeyLoggers Destructive Trojans Denial of Service (DoS) Attack Trojans Proxy/Wingate Trojans FTP Trojans
Working of the Trojan Trojan has 2 Components 		* A Client Component 		* A Server Component Server part get installed in victims Computer Client Program operated by attacker
Hacking the Remote Computer Attacker tries to install the server part in victims Computer Attacker gets the ip address and port number of the victims computer Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
Trojan Attacks Trojan attacks are very simple and easy to execute Zeus trojans are used to attack the Corporate Network  Zeus trojans Spread through e-mail
Internet Security Internet security means hiding our identity behind the network.  i.e. hiding ip address and hiding mac address. Use proxy servers for browsing any websites Use a addon in Mozilla called tor
Security to the Corporate Network Network security is the process of preventing and detecting unauthorized use of your computer Use a Licensed antivirus software System admin should Check the log file Sessions should be sniffed Good to have a honey-pot system
Security to the Personal Computer Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer. Update and tighten Windows before installing new security software To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
Network Threats and Countermeasures Information gathering Sniffing  Spoofing Session hijacking Denial of service
Host Threats and Countermeasures Viruses, Trojan horses, and worms Foot printing Profiling Password cracking Denial of service Arbitrary code execution Unauthorized access
CONCLUSION Securing the personal computer from being hacked is very important issue. The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service. The task of this Trojan is to steal users personal data.
REFERENCE http://www.irchelp.org/irchelp/security/trojanterms.html http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true http://www.sometips.com/tips/security/189.htm http://www.staysafeonline.info/news/safety_study_v04.pdf http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1 www.hackproof.tk www.ciscopress.com  www.windowssecurity.com www.foundstone.com www.sourseforge.net www.itsecurity.com www.netstumbler.com www.insecure.org
QUARIES???
Trojan

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Detection of running backdoors
Detection of running backdoorsDetection of running backdoors
Detection of running backdoors
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Seminar On Trojan Horse
Seminar On Trojan HorseSeminar On Trojan Horse
Seminar On Trojan Horse
 
Trojan backdoors
Trojan backdoorsTrojan backdoors
Trojan backdoors
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
trojan horse- malware(virus)
trojan horse- malware(virus)trojan horse- malware(virus)
trojan horse- malware(virus)
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Trojan
TrojanTrojan
Trojan
 
Trojan
TrojanTrojan
Trojan
 
Trojan
TrojanTrojan
Trojan
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
TIC
TICTIC
TIC
 
Impact of ict on society
Impact of ict on societyImpact of ict on society
Impact of ict on society
 
Computer security
Computer securityComputer security
Computer security
 
Remove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXYRemove TROJ_PIDIEF.SMXY
Remove TROJ_PIDIEF.SMXY
 
Network security
Network securityNetwork security
Network security
 

Similar a Trojan

Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4dodontn
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virusHTS Hosting
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan BackdoorsJauwadSyed
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsVi Tính Hoàng Nam
 
Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Wail Hassan
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric VanderburgEric Vanderburg
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 

Similar a Trojan (20)

It act seminar
It act seminarIt act seminar
It act seminar
 
Cyber Security Seminar Day 2
Cyber Security Seminar Day 2Cyber Security Seminar Day 2
Cyber Security Seminar Day 2
 
Ethical Hacking4
Ethical Hacking4Ethical Hacking4
Ethical Hacking4
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Mitppt
MitpptMitppt
Mitppt
 
The trojan horse virus
The trojan horse virusThe trojan horse virus
The trojan horse virus
 
Trojan Backdoors
Trojan                         BackdoorsTrojan                         Backdoors
Trojan Backdoors
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)Module 6 (trojans and backdoors)
Module 6 (trojans and backdoors)
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 

Último

Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdfVikramadityaRaj
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...sanghavirahi2
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxCeline George
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Celine George
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxShibin Azad
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 

Último (20)

Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 

Trojan

  • 1. TROJAN BY G.Balakrishnaprasad 08885A0402
  • 2. Out line INTRODUCTION TYPES OF TROJANS WORKING OF TROJAN HACKING REMOTE COMPUTER TROJAN ATTACKS INERNET SECURITY SECURING CORPORATE NETWORK SECURING PERSONAL COMPUTER NETWORK THREATS & COUNTERMEASURES HOST THREATS AND COUNTERMEASURES CONCLUSION REFERENCE
  • 3. INTRODUCTION What is trojan Basically trojan is a Program used to gain access the victims computers. Fully Controls the victims Computer Used to hack the remote Computer
  • 4. Types of Trojans Remote Access Trojans Password Sending Trojans KeyLoggers Destructive Trojans Denial of Service (DoS) Attack Trojans Proxy/Wingate Trojans FTP Trojans
  • 5. Working of the Trojan Trojan has 2 Components * A Client Component * A Server Component Server part get installed in victims Computer Client Program operated by attacker
  • 6. Hacking the Remote Computer Attacker tries to install the server part in victims Computer Attacker gets the ip address and port number of the victims computer Using the Client part attacker attacker monitors the remote computer (can access the files, monitor key logs, can crash entire system)
  • 7. Trojan Attacks Trojan attacks are very simple and easy to execute Zeus trojans are used to attack the Corporate Network Zeus trojans Spread through e-mail
  • 8. Internet Security Internet security means hiding our identity behind the network. i.e. hiding ip address and hiding mac address. Use proxy servers for browsing any websites Use a addon in Mozilla called tor
  • 9. Security to the Corporate Network Network security is the process of preventing and detecting unauthorized use of your computer Use a Licensed antivirus software System admin should Check the log file Sessions should be sniffed Good to have a honey-pot system
  • 10. Security to the Personal Computer Use personal firewall, anti-spyware, anti-virus, anti-Trojan, anti-spam, anti-phishing, and privacy software on your desktop computer. Update and tighten Windows before installing new security software To avoid conflicts, do not use two software firewalls or two anti-virus products at the same time. Completely uninstall one before installing another.
  • 11. Network Threats and Countermeasures Information gathering Sniffing Spoofing Session hijacking Denial of service
  • 12. Host Threats and Countermeasures Viruses, Trojan horses, and worms Foot printing Profiling Password cracking Denial of service Arbitrary code execution Unauthorized access
  • 13. CONCLUSION Securing the personal computer from being hacked is very important issue. The Trojan will either penetrate system services and inject its code, or it will disguise it self as an important system service. The task of this Trojan is to steal users personal data.
  • 14. REFERENCE http://www.irchelp.org/irchelp/security/trojanterms.html http://www.microsoft.com/technet/security/topics/virus/virusrat.mspx?pf=true http://www.sometips.com/tips/security/189.htm http://www.staysafeonline.info/news/safety_study_v04.pdf http://www.viruslist.com/eng/viruslist.html?id=1984055&printmode=1 www.hackproof.tk www.ciscopress.com  www.windowssecurity.com www.foundstone.com www.sourseforge.net www.itsecurity.com www.netstumbler.com www.insecure.org