16
Trojan Horse: Implementation and Prevention Prepared By: PATEL BHAGYESH (120420704003) RATHOD GAURANG (005) PATEL PRIYANK (009)

Trojan horse

Embed Size (px)

Citation preview

Page 1: Trojan horse

Trojan Horse:Implementation and Prevention

Prepared By: PATEL BHAGYESH (120420704003) RATHOD GAURANG (005) PATEL PRIYANK (009)

Page 2: Trojan horse

What is a Malware ?

Malware = Malicious + Software

A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.

Page 3: Trojan horse

Types of malware

Virus

Backdoor

Trojan horse

Rootkit

Scareware

Adware

Worm

Page 4: Trojan horse

Malware according to spreading

Page 5: Trojan horse

Trojan Horse

Agenda Introduction of Trojan Horse Objectives of Trojan Horse Types of Trojan Horses Trojan Horse Techniques Implementation with an example Prevention Methods

Page 6: Trojan horse

Trojan Horse Definition

A Trojan describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim computer

Page 7: Trojan horse

Trojan Horse : Introduction A Trojan Horse program is a unique form of computer attack that allows a remote user a means of gaining access to a victim's machine without their knowledge.

Trojan Horse initially appears to be harmless, but later proves to be extremely destructive.

Trojan Horse is not a Virus.

Page 8: Trojan horse

Trojan horses can exploit your system in various and creative ways including:

Creating a "backdoor" that allows remote access to control your machine

Recording keystrokes to steal credit card or password information

Commandeering your system to distribute malware or spam to other computers

Spying on your activities by sending screenshots of your monitor to a remote location

Uploading or downloading files

Erasing or overwriting data

Objectives of Trojan Horse Programs

Page 9: Trojan horse

Types of Trojan HorsesThe EC Council groups Trojan horses into seven main types Remote Access Trojans

Subseven Data Sending Trojans

Eblaster Destructive Trojans

Hard Disk Killer Proxy Trojans

Troj/Proxy-GG FTP Trojans

Trojan.Win32.FTP Attack security software disabler Trojans

Trojan.Win32.Disabler.b denial-of-service attack (DoS) Trojans

PC Cyborg Trojan

Page 10: Trojan horse

Trojan Horse Techniques Alter name of malicious code on system.

Create a file name to obscure the file's type. just_text.txt.exe

abcd.shs where by default the shs file will not be displayed in the system"

Page 11: Trojan horse

Trojan Horse Techniques

Create another file and process with same name eg. UNIX init

process. Combine malicious code with an innocuous program

Page 12: Trojan horse

Implementation of a Trojan Horse ProgramTrojan.Gletta.A is a Trojan horse program that steals Internet banking

passwords. It logs keystrokes of a victim computer when the user visits certain Web pages and then emails the log to the attacker.

1) Trojan.Gletta.A executable locates the System folder copies itself to the system folder and the Windows installation folder.

%System%\Wmiprvse.exe %System%\Ntsvc.exe %Windir%\Userlogon.exe

2) Creates %System%\Rsasec.dll, which is a key logger and %System%\rsacb.dll, which is actually a text file key logger file.

3) Adds a registry key value "wmiprvse.exe"="%system%\wmiprvse.exe" , to the registry key:HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, so that the Trojan runs when you start Windows.

Page 13: Trojan horse

Implementation of a Trojan Horse Program4) On Windows NT/2000/XP, it adds the value: "Run" = "%Windir%\userlogon.exe" to the registry key: HKEY_LOCAL_MACHINE\Software\

Microsoft\WindowsNT\CurrentVersion\Windows, so that the Trojan runs when you start the operating systems.

The program watches for Internet Explorer windows that have any of the following titles: National Internet Banking Welcome to Citibank Bank of China HSBC in Hong Kong or one of the following URLs: https:/ /olb.westpac.com.au/ib/asp/ https:/ /olb.westpac.com.au/ib/

5) It also captures all the keystrokes entered into any windows that match those listed above, and writes them into a log file.

6) Later it uses its own SMTP engine to send the log file to an external mail account of the intruder. The mail has the following characteristics:

Both the FROM and TO addresses have the domain "mail.ru" The subject starts with "Business News from"

Page 14: Trojan horse

Prevention of Trojan Horse Programs Install latest security patches for the operating system.

Install Anti-Trojan software. Trojan Hunter A- Squared

Install anti-virus software and update it regularly

Install a secure firewall

Do not give strangers access (remote as well as physical) to your computer.

Do not run any unknown or suspicious executable program just to "check it out".

Scan all email attachments with an antivirus program before opening it.

Page 15: Trojan horse

Prevention of Trojan Horse Programs Do regular backup of your system.

Do not use the features in programs that can automatically get or preview files.

Do not type commands that others tell you to type, or go to web addresses mentioned by strangers.

Never open instant message (IM) attachments from unknown people.

Do not use peer-to-peer or P2P sharing networks, such as Kazaa, Limewire, Gnutella, etc. as they do not filter out malicious programs hidden in shared files.

Educate your coworkers, employees, and family members about the effects of Trojan Horse.

Finally, protection from Trojans involves simple common sense

Page 16: Trojan horse

THANK YOU..