Upload
sumitra22
View
497
Download
0
Embed Size (px)
Citation preview
TROJAN HORSE VIRUS
CONTENTS :-
VIRUS TROJAN HOURSE PURPOSE AND USAGE CURRENT USAGE COMMON TROJANS HORSE RECENT INNOVATION IN TROJAN SECURITY FROM TROJAN PROJECT INFORMATION
WHAT IS VIRUS ???? ...
A computer virus is a computer program that replicate itself and spread from one computer to another.
The term "virus" is also erroneously, used to refer types of malware, including adware and spyware programs that don’t replicate .
Malware (malicious software) are used disrupt computer operation, gather sensitive information, or gain access to pc’s systems.
Many active malware threats are trojans or worms than viruses. Trojan horses and worms are confused with viruses.
TROJAN HORSE
The term is derived from Greek mythology .
Trojans are non-self-replicating type of malware which appears to perform a desirable function.
Instead it facilitates unauthorized access to the user's computer system.
Do not attempt to inject themselves into other files like computer virus.
Trojans may use drive-by downloads or install via online games ,internet-driven applications
In order to reach target computers.
PURPOSE AND USAGE Trojan can hacker remote access to targeted
computer system. Operations that could be performed by a hacker on
a targeted computer system may include: Use of the machine as part of a botnet. Crashing the computer Blue screen of death Electronic money theft Data theft (e.g. retrieving passwords or credit card
information) Installation of software, including third-party
malware and ransomware Downloading or uploading of files on the user's
computer Modification or deletion of files Keystroke logging Watching the user's screen
CURRENT USAGE
Botnets popularity and availability of advertising services permit authors to violate their users' privacy.
Trojan horses are becoming more common. survey conducted by BitDefender (2009) "Trojan-type
malware are 83-percent of the global. spreads with help of worms and travel across the
internet with them. main purpose to make host system open to access
through the internet. BitDefender states approximately 15% of computers
are members of a botnet (Trojan infection)
COMMON TORJANS HOURSE
Netbus (by Carl-Fredrik Neikter) Subseven or Sub7(by Mobman) Back Orifice (Sir Dystic) Beast Zeus The Blackhole exploit kit[11]
Flashback Trojan (Trojan BackDoor.Flashback)
ProRat ZeroAccess
RECENT INNOVATION IN TORJANS
its code takes advantage of a security flaw of Internet Explorer and Google Chrome .
use host computer as an anonymizer proxy to hide internet usage.
hacker can view internet sites tracking cookies, internet history, any IP logging.
host's computer may show the internet history using effected computer as proxy.
Newer generations of Trojans tend to "cover" olders tracks leaving tracks on viewed page.
the most widely distributed eg such type of Trojan horse are SUB7.
SECURITY FROM TORJANS
Use good antivirus Always scan files emails before
opening to your system Trojans can be far more harmful than
viruses, Use trojans controllers. Never open scam emails. Delete .exe files not from authorized
sites.
TROJAN PROJECT INFORMATION
Our project describes working of a simple trojan.
This trojan crupts window os . It places junk file in c drive to fill
hardisk space Its undetected by antivirus Damage can be restore by deleting .dll
file from c drive.
THANK YOU
ANY QUERIES???...