Trojan Horses - PowerPoint PPT Presentation

About This Presentation
Title:

Trojan Horses

Description:

Trojan Horses, or 'Trojans' are a type of computer virus. ... Pantheon.org (http://www.pantheon.org/articles/t/trojan_horse.html) ... – PowerPoint PPT presentation

Number of Views:2412
Avg rating:3.0/5.0
Slides: 21
Provided by: csF2
Learn more at: http://www.cs.fsu.edu
Category:

less

Transcript and Presenter's Notes

Title: Trojan Horses


1
Trojan Horses
  • What you need to know about one of the worlds
    most dangerous forms of malicious code

2
A Brief History
  • According to legend, the ancient Greeks used a
    giant horse to defeat the Trojans. It was
    received as a gift, but inside the horse was the
    enemy.

3
Trojan Horses Today
  • Trojan Horses, or Trojans are a type of
    computer virus.
  • They are hidden behind a façade of an appealing
    and harmless nature.
  • For someone to get a Trojan, they must download a
    file. This trap may be very easy to fall into,
    because the file will look good on the surface.

4
How to get a Trojan Horse
5
Discussion
  • In our movie, an unsuspecting gamer was lured to
    download the Trojan with the promise of something
    good.
  • If a download seems too good to be true, it might
    be a Trojan.

6
Secret and Unseen
  • Many Trojan Horses do not make themselves known,
    and stay hidden on your computer
  • From behind the scenes, they can gather data and
    send it back to their master!

7
Types of Trojans
  • Remote Access Trojans
  • Data Sending Trojans
  • Destructive Trojans
  • Proxy Trojans
  • FTP Trojans
  • Security Software Disabler Trojans
  • Denial of Service Attack Trojans

8
Remote Access Trojans
  • Allows the attacker to gain complete or partial
    control over a remote computer.
  • Often called RATs.

9
Data Sending Trojans
  • Gathers data such as passwords, credit card
    numbers, etc.
  • Can install keyloggers that record all key
    strokes made.
  • Dont make themselves known, and operate through
    stealth tactics

10
Destructive Trojans
  • Destroys and deletes all files from a computer
  • More like a virus than other types of Trojans

11
Proxy Trojans
  • Allows the attacker to use another computer as a
    proxy server.
  • Illegal activities done by the attacker will be
    traced back to the victims computer, not the
    attackers.

12
FTP Trojans
  • Opens port 21 and allows the attacker access to a
    computer using File Transfer Protocol

13
Security Software Disabler Trojans
  • Designed to kill security programs, such as
    antivirus software of firewalls.
  • Usually combined with other types of Trojans

14
DoS Attack Trojans
  • Makes a Denial of Service attack (Ping of Death,
    Teardrop) that floods your network with useless
    traffic, crippling it.

15
Preventing Trojans
  • 1. Dont open e-mails from suspicious sources
    (ex. i_am_a_virus_at_pwn.net).
  • 2. Change e-mail settings to prevent attachments
    from opening automatically

16
Preventing Trojans
  • 3. Make sure antivirus and firewall programs are
    installed on your computer
  • 4. Avoid using P2P file sharing networks

17
Preventing Trojans
  • Always be very cautious when opening files.

18
Attack Methods
  • By default, file extensions such as .exe and .bat
    are hidden by Windows.
  • Attackers take advantage of this by masking files
    like readme.txt.exe.
  • Icons can also be imitated.
  • Trojans will also open the desired program to
    satisfy the user and avoid suspicion

19
Attack Methods
  • By then, its too late to stop the Trojan

20
Bibliography
  • Wikipedia (http//en.wikipedia.org/wiki/Trojan_hor
    se_(computing))
  • Webopedia (http//www.webopedia.com/TERM/T/Trojan_
    horse.html)
  • Irchelp.org (http//www.irchelp.org/irchelp/securi
    ty/trojan.html)
  • Pantheon.org (http//www.pantheon.org/articles/t/t
    rojan_horse.html)
  • Searchsecurity.com (http//searchsecurity.techtarg
    et.com/sDefinition/0,290660,sid14_gci213221,00.htm
    l)
  • Netlingo.com (http//www.netlingo.com/lookup.cfm?t
    ermTrojan20Horse)
  • Tech-faq.com (http//www.tech-faq.com/trojan-horse
    -virus.shtml)
  • Informit.com (http//www.informit.com/articles/art
    icle.asp?p102181rl1)
  • Cnet News.com (http//news.com.com/Thefutureofm
    alwareTrojanhorses/2100-7349_3-6125453.html)
  • Securityfocus.com (http//www.securityfocus.com/ne
    ws/11209)
Write a Comment
User Comments (0)
About PowerShow.com