makalah tojan horse bing
DESCRIPTION
MAKALAH BAHASA INGGRIS TROJAN HORSETRANSCRIPT
1. Made Manik Datu Yasa (125150301111030)
2. Wisu Edy Putra Hutama (125150301111032)
3. Samsul ma’arif (125150301111033)
4. Bella Aulia R. (125150301111031)
5. Elis Maulidiyah (125150301111034)
PREFACE...........................................................................................................i
TABLE OF CONTENT......................................................................................ii
STRUCTURED ENGLISH TASK
“TROJAN HORSE”
Compiled by :
PROGRAM TEKNOLOGI INFORMASI
DAN
ILMU KOMPUTER
UNIVERSITAS BRAWIJAYA
Grup 5
TABLE OF CONTENT
CHAPTER I INTRODUCTION.........................................................................
1.1 Background.........................................................................................
1.2 Formulation of The Problem...............................................................
1.3 Purpose of writing...............................................................................
CHAPTER II DISCUSSION..............................................................................
2.1 Introducing Of ProRat Software.........................................................
2.2 Create a Trojan Horse Server By Prorat.............................................
2.3 Trojan Horse Configuration................................................................
2.4 Solution Of Trojan Horse....................................................................
CHAPTER III CLOSING...................................................................................
3.1 Conclusion...........................................................................................
3.2 Suggestion...........................................................................................
CHAPTER IV REFERENCES...........................................................................
CHAPTER V QUESTION SECTION................................................................
CHAPTER VI BIOGRAPHY.............................................................................
Praise be to Allah SWT. Prayers and peace be always devoted to the
Prophet Muhammad saw.
PREFACE
Thanks to the abundance of His grace and author of this paper is able to
complete the task in order to fulfill the task of the English language courses In
preparing this paper the task, not a few obstacles that we face.
Don’t forget we like to thaks to :
1. Pratnya as our english lecturer that always support us
2. Our parent that always pray and support for us every moment
3. Our friend that has given more spirit everytime.
The paper is organized so that readers can expand knowledge about Trojan
horses, which we present is based on observations from a variety of resources,
references, and news. The paper is structured with various obstacles. But with
patience and the help of God especially finally this paper can be resolved.
Hopefully, this paper can provide greater insight and to contribute ideas to
the readers especially the students of UB. We are aware that this paper is still a lot
of flaws and is far from perfect. Therefore, to our English lecturer asks input for
improving our paper making in the future and expect criticism and suggestions
from readers.
Malang, May 5th 2013
Grup 5
1.1 Background
The Trojan Horse is a tale from the Trojan War about the subterfuge that
the Greeks used to enter the city of Troy and end the conflict. In
the canonicalversion, after a fruitless 10-year siege, the Greeks constructed a huge
CHAPTER I
INTRODUCTION
wooden horse, and hid a select force of men inside. The Greeks pretended to sail
away, and the Trojans pulled the horse into their city as a victory trophy. That
night the Greek force crept out of the horse and opened the gates for the rest of the
Greek army, which had sailed back under cover of night. The Greeks entered and
destroyed the city of Troy, decisively ending the war.
The main ancient source for the story is the Aeneid of Virgil, a Latin epic
poem from the time of Augustus. The event does not occur in Homer's Iliad,
which ends before the fall of the city, but is referred to in the Odyssey. In the
Greek tradition, the horse is called the "Wooden Horse" (Δούρειος
Ἵππος,Doúreios Híppos, in the Homeric Ionic dialect).
Metaphorically a "Trojan Horse" has come to mean any trick or stratagem
that causes a target to invite a foe into a securely protected bastion or space. It is
also associated with "malware" computer programs presented as useful or
harmless to induce the user to install and run them.
As the name implies, trojan Horse took the idea of the history of ancient
troy war. Trojan horses first made in ..., Trojan horses is one of the dangerous
trojan ever made. trojan horse that managed to infect the victim's computer and
run the appropriate commands will perform the task of creator (hackers). Trojan
horses can be created with a software called ProRat Software. ProRat can be
downloaded free at www.prorat.com is an open source program.
Trojan horse that has been successfully run and infect the victim's
computer will perform tasks as instructed, include making warning pop up
windows, format local disk from the victim’s computer, shutdown victim
computer, and other.
1.2 Formulation of The Problem
How Trojan Horse Created ?
How Trojan Horse infect the Victim Computer?
How many configuration that trojan horse has to infect the Victim
computer ?
How the solution for the victim to avoid from trojan horse ?
1.3 Purpose of Writing
To give information how Trojan Horse broke the victim computer. Give solution for the reader to avoid this trojan infect their computer. Avoid from cyber crime. Add knowledge about Trojan Horse.
2.1 Introducing Of ProRat Software
Trojan horse created by software that called ProRat software, it’s a kind of
open source software, so it can be downloaded for free at www.prorat.com. It’s a
simple way to create a Trojan horse by ProRat software.
ProRat is a Microsoft Windows based backdoor trojan horse, more
commonly known as a RAT (Remote Administration Tool). As with other trojan
horses it uses a client and server. ProRat opens a port on the computer which
allows the client to perform numerous operations on the server (the machine being
controlled). ProRat is available in a free version, and a paid version. In the free
version, ProRat cannot connect to users over wide area networks (WANs), only
over LANs (Local Area Networks). ProRat is known for its server to be almost
impossible to remove without up-to-date antivirus software.
CHAPTER II
DISCUSSION
Image 2.1 ProRat software
2.2 Create a Trojan Horse Server By Prorat
Image 2.2 Created Trojan Horse
2.3 Trojan Horse Configuration
There is 5 Configuration that has maked by ProRat Software to build a
dangerous trojan like trojan horse :
1) Notification
2) General Setting
3) Bind with file
4) Server Extension
5) Server Icon
2.3.1 Notification
When the victim's computer has infect by this trojan, it will record
anything about information of your computer and send to the hacker when your
computer has connected to the internet.
Image 2.3 Notification
When Victim Infected Computer Trojan Horse, Trojan will send all the
information from the victim's computer to a hacker via network.
ProConnective Notification
This notifications works when connect via LAN network, the information will be
transmitted over the LAN network message.
Mail Notification
This notification works if the victim's computer is online, the information will
send from the victim computer to hacker by email.
2.3.2 General Setting
In this Configuration The hacker can send an order to Trojan Horse that
has infect to the victim computer. The hacker can do anything, such us : turn off
security center, turn off windows firewall, kill the antivirus process, deleted
restore point, Kill Task Manager, Format Memory, and other.
General configuration setting is a form of the command, if the trojan has
been successfully running on the victim's computer. Hackers will send commands
to the IP client / ip victim's computer.
Given such orders, turn off security center, turn off the windows firewall,
Image 2.4 General Setting
antivirus kill the process, deleted restore points, Kill Task Manager, Format
Memory, and other. Then the trojan ready to Perform command.
2.3.3 Bind With File
In this configuration Trojan horse can be combine with file, it’s like picture,
document, application, games, etc.
So if hacker send some game, or application to the victim that combine by
trojan horse, and he click it, suddenly Trojan horse will run and working to the
victim computer.
Hacker Combining Trojan Horse With files using software prorat. Trojan
that has been in the combine, has already given to the victim.
If the Trojans succeed in clicks and successfully run on a computer the
trojan will immediately infect the entire contents of the victim's computer.
Hackers are ready to destroy the victim's computer
2.3.4 Server Extensions
In this configuration, Trojan horse Extention can be set to Any Extention
of file, such us : Exe, jpeg, pdf, doc, mp3, etc.
Image 2.5 Bind With File
Image 2.6 Server Extention
So, it’s surely will blind victim eye, and most likely the victim will run the
program.
Hackers Change the extension is using the Trojan Horse software prorat.
Trojan has been the change in extensinya ready to give to the victim.
If the Trojans succeed in clicks and successfully run on a computer the
trojan will immediately infect the entire contents of the victim's computer.
Hackers are ready to destroy the victim's computer.
2.3.5 Server Icon
In this configuration, trojan horse icon can change to any icon by hacker.
Icon that usually change by hacker such us : Microsoft Office icon, Windows
Media Player, Zip, Notepad, etc.
Changing Icon Hacker Trojan Horse With files using software prorat.
Trojan has replaced its icon is ready to give to the victim.
If the Trojans succeed in clicks and successfully run on a computer the
trojan will immediately infect the entire contents of the victim's computer.
Image 2.7 Server Icon
2.4 Solution Of Trojan Horse
The is some solution how to prevent this dangerous trojan run to victim computer,
such us :
1. Keep your best Antivirus up to date
2. Always Check your windows firewall, never turn it off
3. Avoid use pirated software, because most it has many kind of virus or
trojan inside.
4. Avoid use Patch, Crack, and dont install it as Recommended.
3.1 Conclusion
From all of statement Above, we know that if trojan horse infect to victim
computer, it will too dangerous to the victim computer. The hacker can do
anything to victim computer by trojan horse.
You can imagine how it so dangerous if the trojan delete some files
or maybe format our Hdd or delete some important document. So, the only way
maybe yo should do, is Reinstall your Computer windows, and repair your
computer windows. Or the trojan will extremely dangerous in your computer
windows.
3.2 Suggestion
In the era of information technology, the person required to be able to use
technology to the best of its kind. other than that, people are required to know the
crime in the technology, in order to avoid all these health benefits.
Trojan horse is one of the tools commonly used by hackers in committing
crimes in cyberspace. since it was first created Trojan horse able to paralyze the
victim without the victim's computer looks. The papers are expected to be useful
for the reader to be more careful - careful in using technology.
CHAPTER III
CLOSING
CHAPTER IV
REFERENCES
CHAPTER V
QUESTION SESSION
CHAPTER VI
BIOGRAPHY
Made Manik Datu Yasa, he was born on September, 26th 1994 in
Rogojampi, Banyuwangi, Jawa Timur. He’s a last son from I Gede Adi Putra and
Kadek Hindawati. He Started his Studies in 1st Patoman Elementary School. He
was Graduated in 2006 and continued his study in 2nd Rogojampi Junior High
School.
In 2009, he was graduated and continued his study in 1st Giri Senior High
School. And he was graduated and continued his study at University of Brawijaya
at Malang until now. His hobby such us : playing piano, and playing games at free
time, listening music, and football. Ever dreamed to become a pilot when he was
child. His motto is “Be the best that you can do”.
His name is Wisu Edy Putra Utama.He was born on Januari, 30th 1994 in
Sosa, Padang Lawas, Sumatera Utara. he was the first child of Edy Sapto and
Dewi Sugiartini. He started school at pasar ujung batu elementary School since
2000 to 2006 and continued tu 1st Sosa junior high school since 2006 to 2009 and
continued to 6th PadangSidimpuan high school.
And now, he study at University of Brawijaya. My hobby is :
playing game, football, and anything as it makes my happy. My moto is “Life is
simple when we live with heart”.