What Is A Trojan?: Overt Channel
What Is A Trojan?: Overt Channel
What Is A Trojan?: Overt Channel
Objectives Of Trojans:
There can be different type of objective:
Using the Trojaned machine as part of a Botnet to stage another attack like DDOS
etc.
Trojans can install Softwares so that they can upload or download files and data
directly from your computer.
Trojans also supports Keystroke logging and they can monitor people without their
knowledge.
Trojan
2.
Backdoors etc.
3.
Working of Trojans:
An attacker can get access to the system in multiple way.
If the Trojan is direct connecting Trojan then attacker can connect to the victim
directly and can get access to the victim machine, but the scenario is not always that easy.
Victim can be behind a Firewall, in that case direct connection Trojans will not any provide
any access to the victim computer even if the victim is infected.
Here comes the Reverse Connecting Trojans into the scene, In Reverse Connection
Scenario, attacker need to connect to the victim instead reverse connecting Trojan
themselves tries to create and maintain the connection between the victim and attacker
which can bypass firewall if the trojan is using that protocol and port which is allowed from
inside network.
Remote Access Trojans: Remote Access Trojans provides the whole access of the
machine.
Destructive Trojans: Some trojans are created with a purpose that they will destruct
the normal working or booting procedure of the victim machine.
Denial-of-Service (DoS) Attack: Some trojans works a dump zombies and they wait
for the attacker to give commands and usually they are being used for DDOS attacks.
Proxy Trojans: Proxy Trojans are provides the access of the victim machine in the
same way as the Remote access trojan does , but it gives the additional functionality that
attacker can use the victims machine as a proxy server which will hide the attacker from
being logged.
FTP Trojans: FTP trojans are those which open the ftp port 21 on the victim machine
and allows attackers to access it through ftp client
Security Software Disablers: Some trojans are designed to check and disable the anti
virus, internet security tools on the victim machine thus making them vulnerable to attacks
and prevent themselves from being detected.
Trojans can also retrieve data like bank account numbers, social security numbers,
insurance information etc.
Trojans can also access calendar information like important meetings and other
notes concerning the victims presence or activity.
Trojans can also stage the victim machine to hack further for some illegal cause and
leave the victim for consequences.
Through Internet Relay Chats and messengers like gtalk and yahoo.
Trojans can also infect the system through a physical access of the system
Browser and email software security bugs can allow attackers to compromise
machine and then infect it with trojans for future access.
Trojans can also replicate while sharing data within a domain network.
Untrusted sites and freeware software site also transmits the trojans in an affective
manner.
[autorun]
For example to create a CD or pen drive that will autorun the program server.exe
would require an AUTORUN.INF file similar to:
Ports
==================
Deepthroat
6670
Netbus
6666
Prorat
5110
Secret agent
11223
Asylum
23456
This reduces the suspicion level of the victim over attacker and it also helps in
convincing the victim to execute that wrapped file
Using wrappers, we have combined two different applications as a single file, now
when victim executes that file single wrapped file, it first installs the trojan in the
background and then run the legitimate application after it.
By scanning the system for suspicious open ports using tools such as netstat &
TCPview
By scanning for suspicious running processes using process Viewer.
By scanning for suspicious registry entries using the following tools such as
MSConfig.
By scanning what type network connection are being established by using wireshark
and save that data packets capture and analysis them to see to which IP address they are
connecting to.
Do not download blindly from any websites that you are visiting.
Do not trust the file even if the file coming from a friend, there may be a possibility
that your friends system is also infected and it might also your system as well, so be sure
what the file is before opening it.
Disable the autopreview or autoplay option from the media that you are connecting to
your computer.
Do not type commands that you have received in a mail from someone or not type
anything in the browser that can a malicious script that may further infect your computer.
Prorat: