What The Trojans Or Trojan Horse Back Door And Work

03/07/2011 19:46

lets begins with:

Mandate various malicious code

Understanding the different types of backdoors

Overview of the various tools of Troy

Learning effective prevention methods and countermeasures


Overview of Anti-Trojan Software


Learning to produce a Trojan

Trojans and Backdoors

A Trojan horse is as follows:


An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.


A legitimate program that has been altered by the placement of unauthorized code within it, this code performs functions unknown (and probably unwanted) by the user.


Any program that appears to be appropriate and necessary actions, but (because of unauthorized code within it is unknown to the user) performs functions unknown (and definitely unwanted) users.

Trojans can do something that the user running the program on the remote machine can. This includes deleting files, transfer to the intruder any files that can read, edit all the files that can be changed, install other applications, such as programs that provide unauthorized access to the network, the user entitled to a privilege and implement altitude attacks, is the Trojan may attempt to exploit a vulnerability to increase the level of access without the user running the Trojan horse. If successful, the function of Trojan horse to an increase in privileges and go to install other malicious code.

If the user has administrative rights on the operating system, a Trojan horse can do anything, the administrator can access.

The compromise of any network system may have implications for other systems on the network. Particularly vulnerable are systems that transmit authentication material, such as passwords, over shared networks in clear text or trivially encrypted form, which is very common.

If a system of such a network is compromised via a Trojan (or otherwise), the intruder may be able to record user names and passwords or other sensitive information as it navigates on the network.

In addition, a Trojan horse, according to the actions taken may falsely imply that the remote system as the source of a spoofing attack, so the remote system of accountability.