What The Trojans Or Trojan Horse Back Door And Work
lets begins with:
Mandate various malicious code
Understanding the different types of backdoors
Overview of the various tools of Troy
Learning effective prevention methods and countermeasures
Overview of Anti-Trojan Software
Learning to produce a Trojan
Trojans and Backdoors
A Trojan horse is as follows:
An unauthorized program contained within a legitimate program. This unauthorized program performs functions unknown (and probably unwanted) by the user.
A legitimate program that has been altered by the placement of unauthorized code within it, this code performs functions unknown (and probably unwanted) by the user.
Any program that appears to be appropriate and necessary actions, but (because of unauthorized code within it is unknown to the user) performs functions unknown (and definitely unwanted) users.
Trojans can do something that the user running the program on the remote machine can. This includes deleting files, transfer to the intruder any files that can read, edit all the files that can be changed, install other applications, such as programs that provide unauthorized access to the network, the user entitled to a privilege and implement altitude attacks, is the Trojan may attempt to exploit a vulnerability to increase the level of access without the user running the Trojan horse. If successful, the function of Trojan horse to an increase in privileges and go to install other malicious code.
If the user has administrative rights on the operating system, a Trojan horse can do anything, the administrator can access.
The compromise of any network system may have implications for other systems on the network. Particularly vulnerable are systems that transmit authentication material, such as passwords, over shared networks in clear text or trivially encrypted form, which is very common.
If a system of such a network is compromised via a Trojan (or otherwise), the intruder may be able to record user names and passwords or other sensitive information as it navigates on the network.
In addition, a Trojan horse, according to the actions taken may falsely imply that the remote system as the source of a spoofing attack, so the remote system of accountability.