Trojan
Trojan is MALWARE program that contains MALICIOUS code. The program that perform malicious activity that is not authorized by the user or victim.
Malware,
short for malicious software, is any software used to disrupt computer
operation, gather sensitive information, or gain access to private
computer systems.
Malware is defined by its malicious intent, acting against the
requirements of the computer user, and does not include software that
causes unintentional harm due to some deficiency.
RAT (Remote Administration Tool):
Remote
Administration Tool is used to Trojans. With the help of RAT you can
create Trojan easily. It is also used to control Victims PC. RAT is
created by the Hackers to help Hackers.
Rat are available for both types of Trojans (Direct Connection, Reverse Connection Trojan). There are numerous RATS available over the internet.
Rat are available for both types of Trojans (Direct Connection, Reverse Connection Trojan). There are numerous RATS available over the internet.
If
Trojans gets into your system then it will collect all your personal
information without you being aware of it. Trojans are very difficult to
remove on your own and slow down your PC. We can say Trojan as a
program. This program gets installed in the background while you are
doing something else on the internet. Trojans has fairly widespread
because of your cable modem or DSL connection is always connected.
With the help of Trojan an attacker can get access to stored password, he can able to read your personal documents stored in your PC, delete files, and he show the images on the screen.
Difference between Virus, Worms and Trojans:
With the help of Trojan an attacker can get access to stored password, he can able to read your personal documents stored in your PC, delete files, and he show the images on the screen.
Difference between Virus, Worms and Trojans:
TROJAN: Trojan is a program that once executed performs a task other then expected.
VIRUS: Virus
is an application it self replicates by injecting its code into other
data files. Virus spreads and attempts to consume specific targets and
are normally executable.
WORMS: Worm copies itself over a network. It is a program that views the infection points of another computer rather than as other executable files on an already infected computer.
WORMS: Worm copies itself over a network. It is a program that views the infection points of another computer rather than as other executable files on an already infected computer.
Types of Trojans:
1. Direct connection Trojan
2. Reverse connection Trojan
Trojans are transmitted in many ways:
1. Email Attachments
2. Physical Access
3. Software
4. Images
5. Advertisements
6. Fake programs
2. Reverse connection Trojan
Trojans are transmitted in many ways:
1. Email Attachments
2. Physical Access
3. Software
4. Images
5. Advertisements
6. Fake programs
Trojan Creators looks for:
1. Confidential Documents
2. Credit Card Information
3. Account Data (Email, Password, Username, etc)
4. Financial Data
5. Using Victims PC for illegal purpose.
BEAST:
Beast is a Windows-based backdoor Trojan horse, more commonly known in the underground hacking community as a RAT. It is capable of infecting versions of Windows from 95 to XP.
Beast is a Windows-based backdoor Trojan horse, more commonly known in the underground hacking community as a RAT. It is capable of infecting versions of Windows from 95 to XP.
Beast
was one of the first Trojans to feature a reverse connection to its
victims, and once established it gave the attacker complete control over
the infected computer. Beast came with a built-in firewall by-passer
and had the ability of terminating some Anti-Virus or firewall
processes. It also came with a binder that could be used to join two or
more files together and then change their icon.
It
is discontinued in year 2004 and any PC infected by Beast can be easily
disinfected by starting windows XP in safe-mode and than removing some
infected system files. Also the system restore must be turned off to do
this process.
Stay Safe !!!