Ethical Experts
Ethical Experts
Ethical Experts
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Ethical Experts

A Community Dedicated to Helping and Learning . Here You Will Get Hacking Tutorials and Monetizing Methods . We Hope You Have a Pleasant Stay
 
HomeHome  SearchSearch  Latest imagesLatest images  RegisterRegister  Log in  
Still Currently working on the forum design, until I find a perfect design that can sit there for the whole life :p .. Please Bare with us if you see the design change while / after you refresh a page or return ! Sorry for the Inconvenience ~!
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Hack Pack : Largest Hacking Tools Collection
Trojans Horse  EmptyTue Apr 28, 2015 9:35 am by THE-OUTSIDER

» Hi everyone!
Trojans Horse  EmptyFri Nov 07, 2014 11:24 pm by zekrum

» Hacking Email ID's
Trojans Horse  EmptyThu Sep 25, 2014 7:22 pm by NAVEEN KUMAR . S

» entering in a computer binary
Trojans Horse  EmptySat Sep 20, 2014 1:29 pm by erosh23

» hi hackers
Trojans Horse  EmptySat Sep 20, 2014 1:26 pm by erosh23

» Introduce Yourself !
Trojans Horse  EmptySat Sep 20, 2014 1:23 pm by erosh23

» Hello guys
Trojans Horse  EmptyWed Jul 30, 2014 10:52 pm by RZero67

» need botnet like zues Betabot or any good botnet files please admin help me
Trojans Horse  EmptyFri Jul 25, 2014 9:44 pm by sire_roktiv

» Extension Spoofer v0.1 [Beta Release]
Trojans Horse  EmptyFri Jul 11, 2014 9:33 am by The Joker

Most Viewed Topics
Hack Pack : Largest Hacking Tools Collection
HACK WIFI PASSWORD USING CMD WHEN YOU ARE CONNECTED WITH WIFI
Hack Your BroadBand !! RISK FREE !!
Hacking With Keyloggers Prorat
How to Hack the Windows Admin Password Using OphCrack in Backtrack tutorial
How to Get Unlimited time in an Internet Cafe ... :D
How to Hack Websites & Servers - Tutorial
Cracking a WPA/WPA-2 Password.. ;)
Backtrack and Facebook
Credit Card Generating Sequence
Keywords
wifi netcat hack LARGEST
Facebook Like

 

 Trojans Horse

Go down 
AuthorMessage
The Joker
Admin
Admin
The Joker


Posts : 182
Join date : 2012-06-11
Age : 33

Trojans Horse  Empty
PostSubject: Trojans Horse    Trojans Horse  EmptyFri Oct 05, 2012 7:37 am

The word Trojan horse has been derived from Greek mythology in which Greeks built a huge wooden horse for their soldiers to hide and then placed that horse in front of Troy gates. Troy citizen thought its is gift to them for victory over Greeks and thus Greeks soldiers successfully bypassed the huge wall of Troy and destroyed it.
In world of computers and security Trojans are considered as malicious security breaking software or program, which cause considerable amount of damage to both software and hardware of the system. Trojans are written to steal information from other systems and to exercise control over victim PC. They can be used for destructive as well as spying purposes.

A computer Trojan horse use to enter victim's PC using a legitimate program and has all privileges that the user has. For example a Trojan can appear as a video or image file, even when you'll open it, you'll see video or image(how we will discus it later). A Trojan is generally wrapped into another program thus giving it hidden functionality. Once infected with Trojan an attacker can use victim's PC for his/her malicious activities like stealing credit cards, personal information, cause a Denial Of Service Attack and even for hacking another systems.

Basically Trojans Are Classified As Follows:

Remote Access Trojans(RATs):
Remote Access Trojans are today better known as Remote Administration Tool. They provide full access over victim's system to attackers and enable him/her to remotely access files, private conversations, transactional data etc.

Data Sending Trojans:
These Trojans are used for stealing information like passwords, credit card numbers, companies private and confidential data etc. They do this by installing keystroke loggers in system and send record to attacker via ftp or emails.

Destructive Trojans:
As name suggests these are written solely for destructive purposes and can destroy OS by deleting core files of system.

Denial Of Service DoS Attack Trojans:
They enable an attacker to launch a Distributed Denial Of Service (DDoS) attack against another victim.

Proxy Trojans:
These Trojans turn victim's PC into a proxy server for attacker, enabling him/her to do any malicious activity online with full anonymity.

FTP Trojans:
These allow attacker to connect victim as a FTP server due to which he can download all files in victim PC using port 21.

Security Disablers:
These are special kinda Trojans specially used to attack security measures in victim PC.


Now the real reality check, today most of the Trojans have all those features mentioned above. A Trojan can surely act as perfect backdoor and invisible and remotely installable and uninstallable rootkit.
Back to top Go down
http://teamiha.tumblr.com
 
Trojans Horse
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Ethical Experts :: Hacking Section :: Hacking Tutorials-
Jump to: