Mukezh

Session Trojan

Nov 29th, 2018
70
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.50 KB | None | 0 0
  1. Trojans:
  2. -------
  3. Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.
  4.  
  5. Trojans can be differentiated on the basis of connections:
  6.  
  7. 1.Forward connection based trojans
  8. 2.Reverse connection based trojans
  9.  
  10.  
  11.  
  12. 1. Forward Connection
  13. ---------------------
  14. When the attacker have the target's IP Address, then he can directly attack the system.
  15. 1. Target keeps on moving --> IP Address of the target will keep on changing
  16. 2. It will be very very hard for an attacker to get the target's IP Address everytime, when he will change the location.
  17.  
  18.  
  19.  
  20. 2. Reverse Connection
  21. ---------------------
  22. This is the current type of trojan that is implemented nowadays in which an attacker uses his/her IP address to launch an attack. Its not required to know the IP address of the victim. The trojan developed by hacker is send to the victim and further when executed by victim attacker gets the access.
  23.  
  24. Tools we use to make a trojan is a third party tool known as Remote Administrative Tool (RAT).
  25. eg: Dark Comet
  26. NjRAT
  27. Nanocore etc...
  28.  
  29. Note: The RAT's created from the above tools or from somewhere else could be implemented on internet and intranet but the procedure varies...
  30. INTRANET : when attacker and the victim are on the same network
  31. INTERNET : when attacker and the victims are in a different network (using DDNS and port forwarding)
  32.  
  33.  
  34. Tool:Dark comet
  35.  
  36.  
  37. steps:
  38. 1.create a server with your ip details then send to victim
  39. 2.listen to the port which you set while creating server
  40. 3.wait for incoming connection.once they connected,then control their system
  41. Anti-Malware :
  42. ================
  43. The softwares which are made to detect the malwares and preventing them from destroying the system.
  44. Like : anti-virus or Web security
  45.  
  46. How the Anti-malware programs work:
  47. ------------------------------------
  48. They basically work on the basis of signatures and definitions .Every application created has its own signature so these anti malwares have a database of signatures(of trojans).So when they find a signature of application in the database they consider it to be a virus or trojan and simply remove it or ask for actions to implemented ...
  49.  
  50. https://www.youtube.com/watch?v=bTU1jbVXlmM
Add Comment
Please, Sign In to add comment