My site has been moved!

You should be automatically redirected in 6 seconds. If not, visit
http://www.hackagenius.co.cc
and update your bookmarks.




Trojans and Backdoors

Posted by smit sanghvi Sunday, November 1, 2009

A Trojan horse is an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.
  • It is a legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user.
  • Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.
Working of Trojans

 
  • Attacker gets access to the trojaned system as the system goes online
  • By way of the access provided by the trojan attacker can stage attacks of different types.
Various Trojan Types
  • Remote Access Trojans
  • Password Sending Trojans
  • Keyloggers
  • Destructive
  • Denial Of Service (DoS) Attack Trojans
  • Proxy/Wingate Trojans
  • FTP Trojans
  • Software Detection Killers
Modes of Transmission
  • Attachments
  • Physical Access
  • Browser And E-mail Software Bugs
  • NetBIOS (File Sharing)
  • Fake Programs
  • Un-trusted Sites And Freeware Software
Backdoor Countermeasures
  • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
  • An inexpensive tool called Cleaner (http://www.moosoft.com/cleanet.html) can identify and eradicate 1000 types of backdoor programs and trojans.
  • Educate your users not to install applications downloaded from the internet and e-mail attachments.

0 comments

Post a Comment

Visit our new website

Our Newsletter

Enter your email address To Subscribe Us Via Email:

Our SMS Updates