SEO Forum
Create your own forum and gain full access login Here.

Join the forum, it's quick and easy

SEO Forum
Create your own forum and gain full access login Here.
SEO Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.

How Trojan Horse Works

Go down

How Trojan Horse Works Empty How Trojan Horse Works

Post by Admin Sat Sep 04, 2010 7:27 pm

How Trojan Horse Works Trojan_works
There are mainly two part of Trojans system : Server and Client.

Attacker installs trojan client on his own machine , create trojan server that can communicate with client .



Than attacker installs trojan server on target machine using one of the following methods :


  • Email : The most widely used delivery method. It can be sent as an attachment in an email .
  • News
    Groups : By posting articles in newsgroup with file attachments like
    (mypic.exe) in adult newsgroups are almost guaranteed to have someone
    fall victim.

  • Grapevine
    : Unfortunately there is no way to control this effect . You receive
    the file from a friend who received it from a friend etc. with USB
    drives or other disks.

  • Chat
    Sites and Instant messaging : Sending server files while chatting on
    chat sites or instant messaging services like yahoo chat.

  • LAN
    Spreading : If attacker have physical access to one machine on network ,
    he can easily spread server on other machines on same network , and get
    access.




Now we assume that server is installed on target machine. And move further with how communication occurs .


There are two ways trojan server can communicate with attacker's machine:


1.
When targets machine where the server is installed becomes online
server automatically sends IP address of that machine to the attacker ,
so attacker can use IP address to connect to server .



2.Server
automatically connects to client installed on attackers machine using
attacker's IP address that are given when server is created . This
method also works even if attacker have dynamic IP address using
dynamic DNS services such as no-ip.com or dydns.com.



Now
the client is connected to server attacker have full access to target
machine . Attacker use client GUI for sending instructions to server and
server operates like that.



Some
trojans also have features like bypassing any firewalls , automatically
spreading server with emails or network connections , injecting other
files so it can spread with other files.
Admin
Admin
Sword
Sword

Posts : 164
Points : 1204
Reputation : 0
Join date : 2010-08-27
Age : 38
Location : India

http://www.shaileshtripathi.in

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum