The term Trojan Horse originated from Greek mythology. Greek warriors offered the people of Troy (Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors. At night, after most Trojans were asleep, the warriors burst out of the horse and overtook the city.A Trojan Horse in the world of computing is malware that carries out malicious operations under the guise of a desired function. A virus or worm could carry a Trojan Horse. A Trojan Horse contains hidden, malicious code that exploits the privileges of the user that runs it. Games can often have a Trojan Horse attached to them. When running the game, the game works, but in the background, the Trojan Horse has been installed on the user's system and continues running after the game has been closed.
The Trojan Horse concept is flexible. It can cause immediate damage, provide remote access tothe system (a back door), or perform actions as instructed remotely, such as "send me the password file once per week."
Custom-written Trojan Horses, such as Trojan Horses with a specific target, are difficult to detect.
- Trojan Horses are usually classified according to the damage that they cause or the manner in which they breach a system:
-> Remote-access Trojan Horse (enables unauthorized remote access)
->Data sending Trojan Horse (provides the attacker with sensitive data such as passwords)
->Destructive Trojan Horse (corrupts or deletes files)
->Proxy Trojan Horse (user's computer functions as a proxy server)
->FTP Trojan Horse (opens port 21)
->Security software dis abler Trojan Horse (stops anti-virus programs or firewalls from functioning)
->Denial of Service Trojan Horse (slows or halts network activity)
->Data sending Trojan Horse (provides the attacker with sensitive data such as passwords)
->Destructive Trojan Horse (corrupts or deletes files)
->Proxy Trojan Horse (user's computer functions as a proxy server)
->FTP Trojan Horse (opens port 21)
->Security software dis abler Trojan Horse (stops anti-virus programs or firewalls from functioning)
->Denial of Service Trojan Horse (slows or halts network activity)
For Further Reading,
- Why We used areas in OSPF routing protocol?
- How to create a TCL script in router for ping ?
- How to configure GNS3 to a virtual box client.
- First Worm Infection
- Spring Framework - MethodReplacer Example in spring
- Spring Framework - Example of Database Connectivity with DataSource
- Spring Framework- Execption handling in AOP
- Spring Framework - Example to use @Before annotation with args() in AOP
- Spring Framework-Example to use JoinPoint in AOP
- What is GIS ?
- What is Cloud Computing and advantage of cloud
- The difference between the FileSystemApplicationContext and ClassPathXmlApplicationContext
- How to worms are infects to networks what are the steps are used to infect network?
- An Intresting story about Trojan Horse
- Difference among Point to Point,Broadcast and Non-broadcast multiaccess networks
- Command to enable OSPF Routing protocol on Router interface mode
0 comments:
Post a Comment