Similar topics
Most active topics
Social bookmarking
Bookmark and share the address of warez forum on your social bookmarking website
Bookmark and share the address of SEO Forum on your social bookmarking website
How Trojan Horse Works
SEO Forum :: BlackHatWorld :: SEO
Page 1 of 1
How Trojan Horse Works
There are mainly two part of Trojans system : Server and Client.
Attacker installs trojan client on his own machine , create trojan server that can communicate with client .
Than attacker installs trojan server on target machine using one of the following methods :
Now we assume that server is installed on target machine. And move further with how communication occurs .
There are two ways trojan server can communicate with attacker's machine:
1.
When targets machine where the server is installed becomes online
server automatically sends IP address of that machine to the attacker ,
so attacker can use IP address to connect to server .
2.Server
automatically connects to client installed on attackers machine using
attacker's IP address that are given when server is created . This
method also works even if attacker have dynamic IP address using
dynamic DNS services such as no-ip.com or dydns.com.
Now
the client is connected to server attacker have full access to target
machine . Attacker use client GUI for sending instructions to server and
server operates like that.
Some
trojans also have features like bypassing any firewalls , automatically
spreading server with emails or network connections , injecting other
files so it can spread with other files.
Attacker installs trojan client on his own machine , create trojan server that can communicate with client .
Than attacker installs trojan server on target machine using one of the following methods :
- Email : The most widely used delivery method. It can be sent as an attachment in an email .
- News
Groups : By posting articles in newsgroup with file attachments like
(mypic.exe) in adult newsgroups are almost guaranteed to have someone
fall victim. - Grapevine
: Unfortunately there is no way to control this effect . You receive
the file from a friend who received it from a friend etc. with USB
drives or other disks. - Chat
Sites and Instant messaging : Sending server files while chatting on
chat sites or instant messaging services like yahoo chat. - LAN
Spreading : If attacker have physical access to one machine on network ,
he can easily spread server on other machines on same network , and get
access.
Now we assume that server is installed on target machine. And move further with how communication occurs .
There are two ways trojan server can communicate with attacker's machine:
1.
When targets machine where the server is installed becomes online
server automatically sends IP address of that machine to the attacker ,
so attacker can use IP address to connect to server .
2.Server
automatically connects to client installed on attackers machine using
attacker's IP address that are given when server is created . This
method also works even if attacker have dynamic IP address using
dynamic DNS services such as no-ip.com or dydns.com.
Now
the client is connected to server attacker have full access to target
machine . Attacker use client GUI for sending instructions to server and
server operates like that.
Some
trojans also have features like bypassing any firewalls , automatically
spreading server with emails or network connections , injecting other
files so it can spread with other files.
SEO Forum :: BlackHatWorld :: SEO
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
Fri Nov 02, 2012 8:13 am by krishdell
» Buy PVA Hotmail Accounts
Tue Oct 23, 2012 7:00 am by kristendesouza
» Buy Twitter Followers | Buy Bulk Twitter Followers
Sat Oct 06, 2012 3:15 am by doofymartin
» Buy Twitter Followers | Buy Bulk Twitter Followers
Sat Oct 06, 2012 3:11 am by doofymartin
» Buy Twitter Followers | Buy Bulk Twitter Followers
Sat Oct 06, 2012 3:06 am by doofymartin
» High Pr [03-09] Back Link list and do follow website's
Sat May 07, 2011 9:11 am by Admin
» [GET] FUll Free Pakage 7000+ Backlinks - BACKLINKBonanza! d0f0llow Forum Links, Blog Comments and more!
Mon May 02, 2011 6:21 am by bdconnect
» 100$/Day....1000%working Trick (only 15min/day working)
Sun Apr 24, 2011 12:08 am by Admin
» Invest 1$ and trick to increase it
Sun Apr 10, 2011 9:49 am by Admin
» 10 Steps to Buying Anything Online for $.01 by Hacking Paypal
Thu Mar 10, 2011 9:14 am by virus231
» Hacking Rapid share and mega upload
Thu Mar 10, 2011 9:11 am by virus231
» Top 11 URl Shortening services - Learn alatest Computer And Mobile Hacking Tricks
Thu Mar 10, 2011 6:26 am by virus231
» SEOmoz Guides SEO Books
Thu Mar 10, 2011 6:21 am by virus231
» Advanced Bulk Backlinks Checker
Thu Mar 10, 2011 6:19 am by virus231
» Super Hide IP 3.0.9.2 + Patch
Mon Feb 28, 2011 4:02 am by samflynn
» Scientific Toolworks Understand 2.6.554 x86/x64 + Keygen
Mon Feb 28, 2011 3:53 am by samflynn
» Joboshare DVD Copy v2.9.9.0219 + Keygen
Mon Feb 28, 2011 3:30 am by samflynn
» FlashFXP 4.0.0 Build 1539 + Patch
Mon Feb 28, 2011 3:20 am by samflynn
» Efofex FX Equation v4.004.5 + Keygen
Mon Feb 28, 2011 3:10 am by samflynn
» AceMoney 4.15.1 + Keynaker
Mon Feb 28, 2011 3:00 am by samflynn