Open top menu
Friday, 17 January 2014

             In this tutorial we will learn about Trojan and its types and the different type of functions executed by them in a system.
A Trojan is a malicious program misguided as some very important application. Trojans comes on the backs of other programs and are installed on a system without the User’s knowledge.
Trojans are malicious pieces of code used to install hacking software on a target system and aid the Hacker in gaining and retaining access to that system.
Trojans is a program that appears to perform a desirable and necessary function, it may be software like monitoring program, system virus scanners, registry cleaners, computer system optimizers, or they may be applications like songs, pictures, screen savers, videos, etc...


Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands, intercept keystrokes, watch screen images, and restart or shut down infected hosts.
Different Types of Trojans :-
1. Remote Administration Trojans: There are Remote Access Trojans which are used to control the Victim’s computer remotely (without any access to the computer).
2. Data Stealing Trojans: Then there are Data Sending Trojans which compromised the data in the Victim’s computer, then find the data on the computer and send it to the attacker automatically.
3. Security Disabler Trojan: There are Security software disablers Trojans which are used to stop antivirus software running in the Victim’s computer.
              
Some of the famous Trojans are as follows,
1. Beast
2. Pro Rat
3. Net Bus
4. Girl Friend
5. Sub seven… etc.
You can Google it to read more about this, you can also download these Trojans and use it on a victim’s computer, but unfortunately it’s not a freeware and most websites have banned these types of Trojans.
Trojan consists of two parts:
1. A Client component
2. A Server component.
One which resides on the Victim’s computer is called the server part of the Trojan.
One which is on the attacker’s computer is called the client Part of the Trojan. For the Trojan to function as a backdoor, the server Component has to be installed on the Victim’s machine.



              Thus these are the different types of Trojan and its function on a remote system. Hope this tutorial is useful to you…Feel free to comment…
Tagged
Different Themes
Written by Lovely

Aenean quis feugiat elit. Quisque ultricies sollicitudin ante ut venenatis. Nulla dapibus placerat faucibus. Aenean quis leo non neque ultrices scelerisque. Nullam nec vulputate velit. Etiam fermentum turpis at magna tristique interdum.

0 comments