Monday, January 31, 2011

WHAT IS A TROJAN HORSE?


A program that appears desirable but actually contains something harmful is called as Trojans. The contents of a Trojan can be a virus or a worm.


A program that comes in secretly and quietly, but it carries a destructive payload. Once you become infected by the worm or virus that the Trojan carries into your computer, it can be very difficult to repair the damage. Trojans often carry programs that allow someone else to have total and complete access to your computer. Trojans usually come attached to another file, such as an .avi, or .exe, or even a .jpg. Many people do not see full file extensions, so what may appear as games.zip in reality could be games.zip.exe. Once the person opens up this file, the Trojan 
goes to work, many times destroying the computer’s functionality.


Your best line of defense is to NEVER accept files from someone you don’t know, and if you have any doubts, then do NOT open the file. Get and use a virus detection program, such as Inoculate and keep it updated regularly.

A Trojan (also called a Trojan horse) is a software program in which harmful or malicious code is contained within another (seemingly harmless) program. When this program executes, the Trojan performs a specific set of actions, usually working toward the goal of allowing itself to persist on the target system. Trojans can allow hackers to open backdoors on your system, giving them access to your files and even network connectivity.

TYPES OF TROJANS

1. Remote Access Trojans

These Trojans are the most popular Trojans now. Everyone wants to have such Trojan because can have access to their victim’s hard drive. The RAT’S (remote access Trojans) are very simple to use. Just make someone run the server and you get the victim’s IP and you have FULL access to his or her computer. They you can almost everything .It depends of the Trojan you use.

But the RAT’S have the common remote access Trojan functions like: key logger, upload and download function, make a screenshot and so on. Some people use the Trojans for malicious purposes. All these sick minds want to do is crash the hard disk. 

There are many programs out there that detect the most common Trojans, but new Trojans are coming every day and these programs are not the maximum defense. The Trojans mostly have the same options. These Trojan restart every time Windows is loaded. That means it has got in the registry or in win.ini or in other system file so the Trojan can restart.

Also the Trojans create some file in the WINDOWS\SYSTEM directory. The file is always looking to be something that the victim will think is a normal WINDOWS executable. Most Trojans hide from the Alt+Ctrl+Del menu. This is not good because there are people who use only this way to see which process are running. There are programs that will tell you exactly the process and the file from where it comes. Yeah but some Trojans as I told you use fake names and it’s a little hard for some people to understand which process should they kill.

The remote access Trojans opens a port on your computer letting everyone to connect. Some Trojans has options like change the port and put a password so only the Hacker that infect you will be able to use the computer. The changed port option is very good because I’m sure you don’t want your victim to see that port 31337 is open on their computer. Remote access Trojans are appearing every day and they will continue to appear.

For those that use such Trojans: BE CAREFULL you can infect yourself and they the victim you want destroyed will revenge and you’ll be sorry. If you don’t know anything about Trojans DON’T USE THEM.

2. Password Sending Trojans

The purpose of these Trojans is to rip all cached passwords and send them to specified e-mail without letting the victim about the e-mail. Most of these Trojans don’t restart every time Windows is loaded and most of them use port 25 to send the e-mail. There are such Trojans that e-mail other information too like ICQ number computer info and so on.  These Trojans are dangerous if you have any passwords cached anywhere on your computer.

3. Key loggers

These Trojans are very simple. The only one thing they do is to log the keys that the victim is pressing and then check for passwords in the log file. In the most cases these Trojans restart every time Windows is loaded. They have options like online and offline recording. In the online recording they know that the victim is online and they record everything. But in the offline recording everything written after Windows start is recorded and saved on the victim’s disk waiting for to be transferred.

4. DestructivE trojans

The only one function of these Trojans is to destroy and delete files. This makes them very simple and easy to use. They can automatically delete all your .dll or .ini or .exe files on your computer. These are very dangerous Trojans and once you’re infected be sure if you don’t disinfect your computer information will no longer exist.

5. FTP Trojans

These Trojans open port 21 on your computer letting everyone that has a FTP client to connect to your computer without password and will full upload and download options. These are the most common Trojans. They all are dangerous and you should be careful using them.

1 comment: