What is TROJAN HORSE ????
A Trojan horse, or Trojan, is malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. "It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems.
About installation?????
Trojan horses can be installed through the following methods:
* Software downloads
* Bundling (e.g. a Trojan horse included as part of a software application downloaded from a file sharing network)
* Email attachments
* Websites containing executable content (e.g., a Trojan horse in the form of an ActiveX control)
* Application exploits (e.g., flaws in a Web browser, media player, instant-messaging client, or other software that can be exploited to allow installation of a Trojan horse)
Some users, particularly those in the Warez scene, may create and distribute software with or without knowing that a Trojan has been embedded inside. Compilers and higher-level software makers can be written to attach malicious software when the author compiles his code to executable form.
EXAMPLE SCENARIO
Attacker -> create trojan server (attacker system is client & victim system is server )
Attacker -> install trojan in victims system
victim -> opens his system normally
Attacker-> Gains the ip of victim from installed server ( notification part )
attacker-> controls the victim computer
In the above scenario there is problems
1) anti virus s/w can detect trojan
But trojan created with full version cannot be detected.
you can also hide the trojan manually without paying anything ( to know follow my blog and email me jvijayanand1989@gmail.com )
softwares
1) RAT
2) BEAST
3) DONALD DICK
download here:
warning: This is given only for educational purpose.Do not try to harm others. we are not responsible for any kind of attack.
No comments:
Post a Comment
comment here