trojan horse program presented by : lori agrawal

18
Trojan Horse Program Presented by : Lori Agrawal

Upload: eleanore-rose

Post on 18-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Trojan Horse Program Presented by : Lori Agrawal

Trojan Horse Program

Presented by :

Lori Agrawal

Page 2: Trojan Horse Program Presented by : Lori Agrawal

Agenda What is Trojan Horse program? Who are the targets? How it gets spread? Impact of Trojan Horse Attack Control of hackers over files Ways to avoid this attack

Page 3: Trojan Horse Program Presented by : Lori Agrawal

Continue:

Detection of attack How to remove Trojan from system Example: SubSeven Capabilities of SubSeven Program Parts of SubSeven A real Trojan Horse Threat Conclusion

Page 4: Trojan Horse Program Presented by : Lori Agrawal

What is Trojan Horse Program?

Trojan Horse is one of the today’s most serious threat to computer security.

A malicious security-breaking program disguised as something benign.

A executable program Once infected, it is controlled totally by a

hacker.

Page 5: Trojan Horse Program Presented by : Lori Agrawal

Who are the most targets?

The home computers Reasons

Private Content Availability Defendless status

Page 6: Trojan Horse Program Presented by : Lori Agrawal

How it gets spread?

Email attachments Sending files in chat rooms Infected computer can attack other

computer

Page 7: Trojan Horse Program Presented by : Lori Agrawal

Impact of Trojan Horse Attack Complete access to victim’s

system Delete and alter files Access to Administrator privileges Other computer get infected An infected computer can be

targeted by any user.

Page 8: Trojan Horse Program Presented by : Lori Agrawal

Control of hackers over files Alter user’s private documents

such as bank statement, credit card statement, password file, mortgage payments files.

Access files remotely as they own it

Access of chat history

Page 9: Trojan Horse Program Presented by : Lori Agrawal

Ways to avoid this attack Don’t download from unknown source Need to be aware of hidden extension Don’t use automatically get file feature Don’t type a command or go to web site

told by a stranger Remove unnecessary services and file

shares

Page 10: Trojan Horse Program Presented by : Lori Agrawal

Detection of attack

Hard to detect whether a computer is infected or not

Not listed under process list of ALT+Ctrl+Delete key

To detect, one can scan his computer for open port

Page 11: Trojan Horse Program Presented by : Lori Agrawal

How to remove Trojan from system

By getting clean re-installation

Anti-Trojan Software

Page 12: Trojan Horse Program Presented by : Lori Agrawal

Example: SubSeven

Trojan Horse program that attacks computer running on Window 9.x platform.

More popular than other types as it provides more options.

Page 13: Trojan Horse Program Presented by : Lori Agrawal

What SubSeven can do? It can restarts Windows of Victim’s computer. It can record sound files from microphone used on victim’s

machine. It can record video images from a video camera attached to the

victim’s computer. It can change desktop color, wallpaper and turn on and off the

victim’s monitor. It can open and close CD-ROM drive. It can capture screen shots of user’s currently activity. A new version of SubSeven also allow hackers to know whether a

victim is presently online, a manager feature that can abort a program running on victim’s machine.

Page 14: Trojan Horse Program Presented by : Lori Agrawal

Part of SubSeven:

SubSeven Server: Must run on victim’s computer.

Client Program: Used by hacker on his machine to connect to server(Victim’s computer).

Server Editor: An interface to Hacker to choose option how to get information from victim’s computer.

Page 15: Trojan Horse Program Presented by : Lori Agrawal
Page 16: Trojan Horse Program Presented by : Lori Agrawal

A real Trojan Horse Threat Targets were customer of Paypal’s

online service Spread using sending emails containing

subject line “PAYPAL.COM NEW YEAR OFFER”

Emails contained information about payment discount

Create a fake Paypal web site and ask for credit card info.

Page 17: Trojan Horse Program Presented by : Lori Agrawal

Conclusion

Serious network security problem Once infected, computer is totally

controlled by hacker. Hard to detect whether a computer

is infected or not. Hard to recover.

Page 18: Trojan Horse Program Presented by : Lori Agrawal

Any Questions?