Seminar On Trojan Horse

of 20 /20
TROJAN HORSE BY- NIKHIL CHABUKSWAR TE ‘C’ 33506 Bansilal Ramnath Agarwal Charitable Trust’s Vishwakarma Institute of Information Technology Pune – 411048. Department of Computer Eng.

Embed Size (px)

description

This is a power-point presentation on "Trojan Horse" which is a hacking technique mostly used by hackers. Trojan appears to be useful program but contain hidden code's such as virus.

Transcript of Seminar On Trojan Horse

Page 1: Seminar On Trojan Horse

TROJAN HORSE

BY-

NIKHIL CHABUKSWAR

TE ‘C’

33506

Bansilal Ramnath Agarwal Charitable Trust’sVishwakarma Institute of Information Technology

Pune – 411048. Department of Computer Eng.

Page 2: Seminar On Trojan Horse

CONTENTS • What is Trojan ?• Tasks Of Trojan• How Trojan Work• Attaching a Trojan• storage Locations And Various Trojans• Algorithm • How can you be infected• Aim of attacker • Trojan Examples• Preventive measure

Page 3: Seminar On Trojan Horse

WHAT IS TROJAN ?

Page 4: Seminar On Trojan Horse

HOW DO TROJAN WORKS ?

• Nothing But a Server Client Program

• Uses TCP/IP protocol as well as UDP protocol

• It is only be send to the target system by user interaction only.

Page 5: Seminar On Trojan Horse

TASKS OF THE TROJAN

• erasing or overwriting data on a computer

• corrupting files in a subtle way

• spreading other malware, such as viruses. In this case the Trojan horse is called a 'dropper'.

• To launch DDoS attacks or send Spam.

• logging keystrokes to steal information such as passwords and credit card numbers (known as a key logger)

• phish for bank or other account details, which can be used for criminal activities.

• Shutting down the windows and rebooting of windows etc.

Page 6: Seminar On Trojan Horse

HOW TO ATTACH THE TROJAN?

• Without Changing the File size• Generally Attached with game or email

Page 7: Seminar On Trojan Horse

WHERE THEY LIVE….

• Autostart FolderThe Autostart folder is located in C:\Windows\Start Menu\Programs\startup and as its name suggests, automatically starts everything placed there.

• Win.iniWindows system file using load=Trojan.exe and run=Trojan.exe to execute the Trojan

Page 8: Seminar On Trojan Horse

ALGORITHM

• Trojan horse attack, used a quantum cryptographic key algorithm with EPR pairs.

• With Quantum cryptography we can create a communication chancel where it is impossible to eavesdrop without disturbing the transmission.

Page 9: Seminar On Trojan Horse

TROJAN VARIATIONS

• Remote Access Trojans• Password Sending Trojans• Denial Of Service (DoS) Attack Trojans• Keyloggers

Page 10: Seminar On Trojan Horse

HOW CAN YOU BE INFECTED……

• Via Email (Attachments)• Physical Access• Visiting Untrusted websites • Peer to peer download system• Installing the untrusted software's.

Page 11: Seminar On Trojan Horse

WHAT IS ATTACKER LOOKING FOR ?• Credit Card Information (often used for domain registration, shopping with your credit

card)

• Any accounting data (E-mail passwords, Dial-Up passwords, WebServices passwords, etc.)

• Email Addresses (Might be used for spamming, as explained above) 

• Work Projects (Steal your presentations and work related papers) 

• Children's names/pictures, Ages (paedophile attacker?!) 

• School work (steal your papers and publish them with his/her name on it)

Page 12: Seminar On Trojan Horse

SOME WELL KNOWN TROJAN

• NetBus• Beast• SubSeven• BOXP

Page 13: Seminar On Trojan Horse

NETBUS TROJAN:-

Page 14: Seminar On Trojan Horse

SERVER SETUP FOR NETBUS

Page 15: Seminar On Trojan Horse

CONNECTION PROCESS.

Page 16: Seminar On Trojan Horse

CONSEQUENCES OF A TROJAN HORSE

• It will cause your computer to run slow• All of your personal data can be stolen or corrupted.• When you open a program it will continue to open programs

on its own.

Page 17: Seminar On Trojan Horse

HOW TO PREVENT

• Anti-Virus (AV) Scanners• Anti-Trojan Software

• E.g Trojan Elite, Trojan Killer.• Clean Yourself• Online Scanning Services

Page 18: Seminar On Trojan Horse

CONCLUSION

• In this seminar we have learned what is Trojan and all the functionality and aspects of the Trojan horse.

Page 19: Seminar On Trojan Horse

REFERENCES

1. Hacking tools & techniques and Incident handling,NIIT by prentice-hall INDIA(2005)2. Denial of Service Attacks (2001). Retrieved May 20, 2004, from http://www.cert.org/tech_tips/denial_of_service.html. 3. http://www.windowsecurity.com/Trojan_horse

Page 20: Seminar On Trojan Horse