Short Note On Trojans

Trojan horse
=> INTRODUCTION TO TROJAN HORSES
=> HOW THEY WORK
=> SOME FAMOUS TROJAN HORSES
=> HOW TO USE & PRACTISE THEM
=> HOW TO SECURE YOUR COMPUTER FROM THEM

INTRODUCTION TO TROJAN HORSES:

As described above a trojan horse is a small size computer program that provides his user a full access on remote computer. Every typical Trojan horse is consist of two parts, i.e

1) Server.exe
2) Client.exe

The server must be installed on the Attacked computer while client is on Attacking computer. Simply we can say that the server can control a computer by getting instrucions from client.

HOW THEY WORK

Server.exe is the part of Trojan horse that a Hacker send to a person to whom he/she wants to hack. Normally its size is 1mb. Usually a Hacker sends this file to the victom by following means,

1) To send it as a game say, chess.exe (the server can be rename) when the victom is chatting with him
2) To send him via Email Attachement
3) To join it with other file using File Jointer or Binder and then send to victom via above two methods

When the victim installs the server.exe then nothing happens on screen. No installation wizard appears, then what happens? is'nt suspicious?
My dear alot of events takes place but they are not visible to victom. A typical Trojan Horse do the following steps.
01) Open CD ROM of the victom's computer
02) Can see his Hard Drive
03) Can send and download files from victom's computer
04) Can see the every key press by victom
05) Can get his cached password
06) Can get his credit card and bank account information
07) Can listen to his microphone and webcam
08) Can delete, rename files
09) Can see systeminformation
10) Can lock keyboard and mouse
11) Can control mouse movement
12) Can change wallpaper
13) Can see task mananger (Excellent feature of JF17thunder)
14) Can Shutdown, Restart, Hang computer
15) Can open any website on victom computer
16) Can Type from Victom's computer automatically
17) Can change the Title of active window
18) Can chat with victom
19) Can send Fake errors
20) and many many more (for more Visit www.jf17thunder.tk help section)

SOME FAMOUS TROJAN HORSES:

This is the list of some famous Trojan Horses
1) JF17thunder
2) Netbus
3) SUB 7
4) School Bus
5) Thief

There are thousands of Trojan horses but as far as I know, all of them, which are available on the internet are detectable by all antiviruses except JF17Thunder. The other distinguishing feature of Jf17thunder is its built-in IP SENDER. Thats why I'll recommend to install Jf17Thunder.

HOW TO LEARN THEM:

You can practice the each and avery function of Troajn Horses on your own computer. In order to do so, Just install Client & Server of your favorite Trojan horse on your computer. In the IP ADDRESS field of Client write 127.0.0.1 (its your local IP) and press connect, After doing so you will see that you are connected to your self. Now you can control your own computer using the trojan horse, just go and check it out.
cont...
HOW TO SECURE YOUR COMPUTER FROM IT

The process is very easy, just install a good firewall and good antivirus in your system which will prevent you from being hacked by all Trojan horses. JF17thunder has ability to break the windows firewall but i dont know that it breaks other third party firewalls or not. You can test it on your own computer. But it is still undetectable by all antiviruses. If you suspect that you are hacked by a trojan horse then you can verify this by doing the following steps.
=> Open your Dos prompt
=> Type Netstat and press enter, by doing so, you will see a list of all active connections.

Close your all programs that are using internet including Yahoo, Msn & Googletalk and then do the above process again. If again a list of active connections appears then it is a great probability that you are hacked by means of trojan horse. that is the end of lecture & Hope you have understood the simple lecture deliver to you.

0 comments: