Home » LEARN HACKING - FOR BEGINNERS, PC SECURITY

Know More About Trojans and Backdoors

Submitted by Srikanth on Friday, 7 November 20087 Comments

A Trojan horse is an unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.

  • It is a legitimate program that has been altered by the placement of unauthorized code within it; this code performs functions unknown (and probably unwanted) by the user.
  • Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.

Working of Trojans

  • Attacker gets access to the trojaned system as the system goes online
  • By way of the access provided by the trojan attacker can stage attacks of different types.

Various Trojan Types

  • Remote Access Trojans
  • Password Sending Trojans
  • Keyloggers
  • Destructive
  • Denial Of Service (DoS) Attack Trojans
  • Proxy/Wingate Trojans
  • FTP Trojans
  • Software Detection Killers

Modes of Transmission

  • Attachments
  • Physical Access
  • Browser And E-mail Software Bugs
  • NetBIOS (File Sharing)
  • Fake Programs
  • Un-trusted Sites And Freeware Software

Backdoor Countermeasures

  • Most commercial ant-virus products can automatically scan and detect backdoor programs before they can cause damage (Eg. before accessing a floppy, running exe or downloading mail)
  • An inexpensive tool called Cleaner (http://www.moosoft.com/cleanet.html) can identify and eradicate 1000 types of backdoor programs and trojans.
  • Educate your users not to install applications downloaded from the internet and e-mail attachments.

Popularity: 3% [?]


  By using/following this site you agree to our Legal Disclaimer

Subscribe to GoHacking.Com


Enjoyed this article?
Subscribe to GoHacking.Com and get daily updates in your email for free

7 Comments »

  • uthman said:

    Ya u told that what is trogen horse but please also tell how to make it

  • me said:

    look, hm,
    1. idk how to make it
    2. how to set it on some page so I shock somebody
    3. how to send it to some person … (by msn..if it can be sended lik dat )
    ..
    4. THS SUX man..

  • Rogery said:

    I´m new in this area, I would annyone send me how to invad by ip, I alredy the Prorat, dark girl, and other but no ane of him work ever give a error when I try to enter his Ip never conect

  • HUMPTYDUMPTY said:

    thanks bro. you just RoCk!!

  • ayaz said:

    hw to do it man??
    tell us completelee bro!!!

  • shahzeb said:

    well bro thanks for sending this info and another thanks for not telling open some kids who are not link to computer science just want to get dark secrets hm hacking should remain open for guys who are attached to it not like other guys who just want to get piece of cake for nothing u rock!

  • fredrich$ said:

    am impressed the world has men with others @ heart as a young internet beginner & hacker i love this stuff …this site is richhhhh. pls it shall be recommended in facebook. sir i bow.
    hence i want to grow & be skillfull. am a nigerian an undergraduate. a previlegde to be ur son(protege). [email protected] +2347064464016

Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.