makalah tojan horse bing

21
1. Made Manik Datu Yasa (125150301111030) 2. Wisu Edy Putra Hutama (125150301111032) 3. Samsul ma’arif (125150301111033) 4. Bella Aulia R. (125150301111031) 5. Elis Maulidiyah (125150301111034) STRUCTURED ENGLISH TASK “TROJAN HORSE” PROGRAM TEKNOLOGI INFORMASI DAN ILMU KOMPUTER UNIVERSITAS BRAWIJAYA Compiled Grup TABLE OF CONTENT

Upload: made-manik

Post on 11-Nov-2014

26 views

Category:

Documents


0 download

DESCRIPTION

MAKALAH BAHASA INGGRIS TROJAN HORSE

TRANSCRIPT

Page 1: Makalah Tojan Horse Bing

1. Made Manik Datu Yasa (125150301111030)

2. Wisu Edy Putra Hutama (125150301111032)

3. Samsul ma’arif (125150301111033)

4. Bella Aulia R. (125150301111031)

5. Elis Maulidiyah (125150301111034)

PREFACE...........................................................................................................i

TABLE OF CONTENT......................................................................................ii

STRUCTURED ENGLISH TASK

“TROJAN HORSE”

Compiled by :

PROGRAM TEKNOLOGI INFORMASI

DAN

ILMU KOMPUTER

UNIVERSITAS BRAWIJAYA

Grup 5

TABLE OF CONTENT

Page 2: Makalah Tojan Horse Bing

CHAPTER I INTRODUCTION.........................................................................

1.1 Background.........................................................................................

1.2 Formulation of The Problem...............................................................

1.3 Purpose of writing...............................................................................

CHAPTER II DISCUSSION..............................................................................

2.1 Introducing Of ProRat Software.........................................................

2.2 Create a Trojan Horse Server By Prorat.............................................

2.3 Trojan Horse Configuration................................................................

2.4 Solution Of Trojan Horse....................................................................

CHAPTER III CLOSING...................................................................................

3.1 Conclusion...........................................................................................

3.2 Suggestion...........................................................................................

CHAPTER IV REFERENCES...........................................................................

CHAPTER V QUESTION SECTION................................................................

CHAPTER VI BIOGRAPHY.............................................................................

Praise be to Allah SWT. Prayers and peace be always devoted to the

Prophet Muhammad saw.

PREFACE

Page 3: Makalah Tojan Horse Bing

Thanks to the abundance of His grace and author of this paper is able to

complete the task in order to fulfill the task of the English language courses In

preparing this paper the task, not a few obstacles that we face.

Don’t forget we like to thaks to :

1. Pratnya as our english lecturer that always support us

2. Our parent that always pray and support for us every moment

3. Our friend that has given more spirit everytime.

The paper is organized so that readers can expand knowledge about Trojan

horses, which we present is based on observations from a variety of resources,

references, and news. The paper is structured with various obstacles. But with

patience and the help of God especially finally this paper can be resolved.

Hopefully, this paper can provide greater insight and to contribute ideas to

the readers especially the students of UB. We are aware that this paper is still a lot

of flaws and is far from perfect. Therefore, to our English lecturer asks input for

improving our paper making in the future and expect criticism and suggestions

from readers.

Malang, May 5th 2013

Grup 5

1.1 Background

The Trojan Horse is a tale from the Trojan War about the subterfuge that

the Greeks used to enter the city of Troy and end the conflict. In

the canonicalversion, after a fruitless 10-year siege, the Greeks constructed a huge

CHAPTER I

INTRODUCTION

Page 4: Makalah Tojan Horse Bing

wooden horse, and hid a select force of men inside. The Greeks pretended to sail

away, and the Trojans pulled the horse into their city as a victory trophy. That

night the Greek force crept out of the horse and opened the gates for the rest of the

Greek army, which had sailed back under cover of night. The Greeks entered and

destroyed the city of Troy, decisively ending the war.

The main ancient source for the story is the Aeneid of Virgil, a Latin epic

poem from the time of Augustus. The event does not occur in Homer's Iliad,

which ends before the fall of the city, but is referred to in the Odyssey. In the

Greek tradition, the horse is called the "Wooden Horse" (Δούρειος

Ἵππος,Doúreios Híppos, in the Homeric Ionic dialect).

Metaphorically a "Trojan Horse" has come to mean any trick or stratagem

that causes a target to invite a foe into a securely protected bastion or space. It is

also associated with "malware" computer programs presented as useful or

harmless to induce the user to install and run them.

As the name implies, trojan Horse took the idea of the history of ancient

troy war. Trojan horses first made in ..., Trojan horses is one of the dangerous

trojan ever made. trojan horse that managed to infect the victim's computer and

run the appropriate commands will perform the task of creator (hackers). Trojan

horses can be created with a software called ProRat Software. ProRat can be

downloaded free at www.prorat.com is an open source program.

Trojan horse that has been successfully run and infect the victim's

computer will perform tasks as instructed, include making warning pop up

windows, format local disk from the victim’s computer, shutdown victim

computer, and other.

1.2 Formulation of The Problem

How Trojan Horse Created ?

How Trojan Horse infect the Victim Computer?

How many configuration that trojan horse has to infect the Victim

computer ?

How the solution for the victim to avoid from trojan horse ?

Page 5: Makalah Tojan Horse Bing

1.3 Purpose of Writing

To give information how Trojan Horse broke the victim computer. Give solution for the reader to avoid this trojan infect their computer. Avoid from cyber crime. Add knowledge about Trojan Horse.

Page 6: Makalah Tojan Horse Bing

2.1 Introducing Of ProRat Software

Trojan horse created by software that called ProRat software, it’s a kind of

open source software, so it can be downloaded for free at www.prorat.com. It’s a

simple way to create a Trojan horse by ProRat software.

ProRat is a Microsoft Windows based backdoor trojan horse, more

commonly known as a RAT (Remote Administration Tool). As with other trojan

horses it uses a client and server. ProRat opens a port on the computer which

allows the client to perform numerous operations on the server (the machine being

controlled). ProRat is available in a free version, and a paid version. In the free

version, ProRat cannot connect to users over wide area networks (WANs), only

over LANs (Local Area Networks). ProRat is known for its server to be almost

impossible to remove without up-to-date antivirus software.

CHAPTER II

DISCUSSION

Image 2.1 ProRat software

Page 7: Makalah Tojan Horse Bing

2.2 Create a Trojan Horse Server By Prorat

Image 2.2 Created Trojan Horse

Page 8: Makalah Tojan Horse Bing

2.3 Trojan Horse Configuration

There is 5 Configuration that has maked by ProRat Software to build a

dangerous trojan like trojan horse :

1) Notification

2) General Setting

3) Bind with file

4) Server Extension

5) Server Icon

2.3.1 Notification

When the victim's computer has infect by this trojan, it will record

anything about information of your computer and send to the hacker when your

computer has connected to the internet.

Image 2.3 Notification

Page 9: Makalah Tojan Horse Bing

When Victim Infected Computer Trojan Horse, Trojan will send all the

information from the victim's computer to a hacker via network.

ProConnective Notification

This notifications works when connect via LAN network, the information will be

transmitted over the LAN network message.

Mail Notification

This notification works if the victim's computer is online, the information will

send from the victim computer to hacker by email.

2.3.2 General Setting

In this Configuration The hacker can send an order to Trojan Horse that

has infect to the victim computer. The hacker can do anything, such us : turn off

security center, turn off windows firewall, kill the antivirus process, deleted

restore point, Kill Task Manager, Format Memory, and other.

General configuration setting is a form of the command, if the trojan has

been successfully running on the victim's computer. Hackers will send commands

to the IP client / ip victim's computer.

Given such orders, turn off security center, turn off the windows firewall,

Image 2.4 General Setting

Page 10: Makalah Tojan Horse Bing

antivirus kill the process, deleted restore points, Kill Task Manager, Format

Memory, and other. Then the trojan ready to Perform command.

2.3.3 Bind With File

In this configuration Trojan horse can be combine with file, it’s like picture,

document, application, games, etc.

So if hacker send some game, or application to the victim that combine by

trojan horse, and he click it, suddenly Trojan horse will run and working to the

victim computer.

Hacker Combining Trojan Horse With files using software prorat. Trojan

that has been in the combine, has already given to the victim.

If the Trojans succeed in clicks and successfully run on a computer the

trojan will immediately infect the entire contents of the victim's computer.

Hackers are ready to destroy the victim's computer

2.3.4 Server Extensions

In this configuration, Trojan horse Extention can be set to Any Extention

of file, such us : Exe, jpeg, pdf, doc, mp3, etc.

Image 2.5 Bind With File

Image 2.6 Server Extention

Page 11: Makalah Tojan Horse Bing

So, it’s surely will blind victim eye, and most likely the victim will run the

program.

Hackers Change the extension is using the Trojan Horse software prorat.

Trojan has been the change in extensinya ready to give to the victim.

If the Trojans succeed in clicks and successfully run on a computer the

trojan will immediately infect the entire contents of the victim's computer.

Hackers are ready to destroy the victim's computer.

2.3.5 Server Icon

In this configuration, trojan horse icon can change to any icon by hacker.

Icon that usually change by hacker such us : Microsoft Office icon, Windows

Media Player, Zip, Notepad, etc.

Changing Icon Hacker Trojan Horse With files using software prorat.

Trojan has replaced its icon is ready to give to the victim.

If the Trojans succeed in clicks and successfully run on a computer the

trojan will immediately infect the entire contents of the victim's computer.

Image 2.7 Server Icon

Page 12: Makalah Tojan Horse Bing

2.4 Solution Of Trojan Horse

The is some solution how to prevent this dangerous trojan run to victim computer,

such us :

1. Keep your best Antivirus up to date

2. Always Check your windows firewall, never turn it off

3. Avoid use pirated software, because most it has many kind of virus or

trojan inside.

4. Avoid use Patch, Crack, and dont install it as Recommended.

Page 13: Makalah Tojan Horse Bing

3.1 Conclusion

From all of statement Above, we know that if trojan horse infect to victim

computer, it will too dangerous to the victim computer. The hacker can do

anything to victim computer by trojan horse.

You can imagine how it so dangerous if the trojan delete some files

or maybe format our Hdd or delete some important document. So, the only way

maybe yo should do, is Reinstall your Computer windows, and repair your

computer windows. Or the trojan will extremely dangerous in your computer

windows.

3.2 Suggestion

In the era of information technology, the person required to be able to use

technology to the best of its kind. other than that, people are required to know the

crime in the technology, in order to avoid all these health benefits.

Trojan horse is one of the tools commonly used by hackers in committing

crimes in cyberspace. since it was first created Trojan horse able to paralyze the

victim without the victim's computer looks. The papers are expected to be useful

for the reader to be more careful - careful in using technology.

CHAPTER III

CLOSING

Page 14: Makalah Tojan Horse Bing

CHAPTER IV

REFERENCES

Page 15: Makalah Tojan Horse Bing

CHAPTER V

QUESTION SESSION

CHAPTER VI

BIOGRAPHY

Page 16: Makalah Tojan Horse Bing

Made Manik Datu Yasa, he was born on September, 26th 1994 in

Rogojampi, Banyuwangi, Jawa Timur. He’s a last son from I Gede Adi Putra and

Kadek Hindawati. He Started his Studies in 1st Patoman Elementary School. He

was Graduated in 2006 and continued his study in 2nd Rogojampi Junior High

School.

In 2009, he was graduated and continued his study in 1st Giri Senior High

School. And he was graduated and continued his study at University of Brawijaya

at Malang until now. His hobby such us : playing piano, and playing games at free

time, listening music, and football. Ever dreamed to become a pilot when he was

child. His motto is “Be the best that you can do”.

Page 17: Makalah Tojan Horse Bing

His name is Wisu Edy Putra Utama.He was born on Januari, 30th 1994 in

Sosa, Padang Lawas, Sumatera Utara. he was the first child of Edy Sapto and

Dewi Sugiartini. He started school at pasar ujung batu elementary School since

2000 to 2006 and continued tu 1st Sosa junior high school since 2006 to 2009 and

continued to 6th PadangSidimpuan high school.

And now, he study at University of Brawijaya. My hobby is :

playing game, football, and anything as it makes my happy. My moto is “Life is

simple when we live with heart”.