The term Trojan Horse originated from Greek mythology. Greek warriors offered the people of Troy (Trojans) a giant hollow horse as a gift. The Trojans brought the giant horse into their walled city, unaware that it contained many Greek warriors. At night, after most Trojans were asleep, the warriors burst out of the horse and overtook the city.A Trojan Horse in the world of computing is malware that carries out malicious operations under the guise of a desired function. A virus or worm could carry a Trojan Horse. A Trojan Horse contains hidden, malicious code that exploits the privileges of the user that runs it. Games can often have a Trojan Horse attached to them. When running the game, the game works, but in the background, the Trojan Horse has been installed on the user's system and continues running after the game has been closed.
The Trojan Horse concept is flexible. It can cause immediate damage, provide remote access tothe system (a back door), or perform actions as instructed remotely, such as "send me the password file once per week."
Custom-written Trojan Horses, such as Trojan Horses with a specific target, are difficult to detect.
- Trojan Horses are usually classified according to the damage that they cause or the manner in which they breach a system:
-> Remote-access Trojan Horse (enables unauthorized remote access)
->Data sending Trojan Horse (provides the attacker with sensitive data such as passwords)
->Destructive Trojan Horse (corrupts or deletes files)
->Proxy Trojan Horse (user's computer functions as a proxy server)
->FTP Trojan Horse (opens port 21)
->Security software dis abler Trojan Horse (stops anti-virus programs or firewalls from functioning)
->Denial of Service Trojan Horse (slows or halts network activity)
->Data sending Trojan Horse (provides the attacker with sensitive data such as passwords)
->Destructive Trojan Horse (corrupts or deletes files)
->Proxy Trojan Horse (user's computer functions as a proxy server)
->FTP Trojan Horse (opens port 21)
->Security software dis abler Trojan Horse (stops anti-virus programs or firewalls from functioning)
->Denial of Service Trojan Horse (slows or halts network activity)
For Further Reading,
0 comments:
Post a Comment