Trojan Horse
Trojan Horse are malicious programs which mislead from its actual intentions. The word of Trojan derived from a Greek story. This is a wooden horse, in which soldiers hiding and waiting to enter the city. When the wooden horse reached in the city and then soldiers came out and attacked. With this theory, Trojan software mislead user intention and wait for time to came out for stealing the user information and also give unauthorized access to Threat actor. The trojan can also spread other connected devices across a network.
Trojans are typically spread by Social Engineering. The purpose or most common use of Trojan programs are: -
- Steal Information
- Infect Connected Devices
- Creating back door
- Gaining Unauthorized Access
- Ransomware Attacks
- Using Victim for Spamming
- Using Victim as Botnet
- Downloading other malicious software
- Disabling Firewalls
The following are list of port wise Trojan, such as
- TCP Port 20 Senna Spy
- TCP Port 21 Invisible FTP
- TCP Port 22 Shaft
- TCP Port 80 Executor
- TCP Port 421 Wappers Trojan
- TCP Port 1095/1098 RAT
- TCP Port 17300 Netbus
- TCP Port 53001 Remote window Shutdown
- TCP Port 456 Hacker Paradise
- Creating Trojan with Trojan Construction Kit
- Creating Droppers for deliver Trojan
- Creating Wrapper for blind the Trojan file
- Execute the Dropper (Trojan File)
- Command Shell Trojans (For Remote Control Command Shell)
- Defacement Trojans (For Editing & Executing Windows Program)
- HTTP/HTTPS Trojans (For Bypassing Firewall and Executing on Target)
- Botnet Trojans ( FOR DDos Attack)
- Proxy Server Trojans ( For Converting Host system to Proxy server)
- Remote Access Trojans ( For GUI access of Target System)
- Avoid to Click on Suspected Email Attachments
- Monitor Network Traffic
- Block unused Ports
- IDS
- Antivirus
- Scan USB or any removeable media before use
- Enable Auditing
- Used Host base Firewall
No comments:
Post a Comment