Sunday, April 27, 2008

TROZENS

Trojan’s are the most dangerous of all types of attacks.

What are Trojans?

Trojans are small programs through which the hacker gain control over your system. Although, most of the Trojans are detected by anti virus programs but the frequency with which these programs are written is far more than the anti virus updating system.

Some common features with Trojans are as follows:

• Capturing screenshots of your computer.

• Recording key strokes and sending files to the hacker

• Giving full Access to all your drives and files.

• Ability to use your computer to do other hacking related activities.

Every Trojan has two parts a Client and a Server. In order to gain access, the server file must be installed in the target computer.

How this is done?

Initially this was done using a simple email. The hacker will send you an email with some sort of attachment (the Server File). The matter of that mail will make you open that attachment, when you double click on it you will see nothing but in the background the server file gets installed on your system.

Now, all the hacker has to do is just use the client file to connect to your system.

But this method became so popular that the hacker has to search for some other technique to achieve the above objective.

How many of you have played small computer games such as “shooting bird”, “catching butterflies”, “slapping some face”, etc

Now, in this technique the hacker joins two exe files into a single file i.e. the server file + the game file.

In this case when you open the attachment you will see the game but at the same time the server also gets installed on your system.

This is just one way; there are many other ways to achieve this objective. So always be careful whenever you are opening an unknown attachment, or while visiting unsafe websites, while chatting, etc.

No comments:

Post a Comment