What Is A Trojan?
A Trojan also known as a Remote Administration Tool, or RAT for short is a piece of software
made for monitoring a system.
Trojans are usually used for malicious purposes. Trojan coders often call there Trojans “Remote
Administration Tools” in order to try and legitimize their software. Although Trojans could be used for legitimate purposes, It is unlikely that anyone who has such a piece of software in their
possession is planning to use the software for purely legitimate purposes.
Trojans are used for things such as stealing sensitive information, stealing passwords,
unauthorized monitoring of a system, deletion of files and even watching girls through there
webcams with out permission.
Trojans normally comprise of 3 things, a Client, Build/Edit Server and Server.
Client
Trojans that are downloaded over the Internet (I am not talking about the actual Trojan server)
normally come with a client. These Clients normally have an easy to use graphical interface, like the Trojans I have documented below.
Clients are used to connect to infected machines and send and receive information.In the case of reverse connection, the server connects to the client.
Build/Edit Server
A Edit Server is a program used to edit the settings of a Trojan server.
These settings include things like:
- Notification Information (How the server sends the IP Address to the Hacker/Script Kiddie)
- Start Up Methods (How the Trojan will run on system start up)
- Stealth Options (Firewall Bypass etc)
- Disabling of things like Command Prompt, Task Manager and Registry Editor.
Once the Hacker/Script Kiddie has inputted all the necessary information he/she will simply save
the settings to the server or possibly build a new server.
Server
The server is the actual virus which the Hacker/Script Kiddie will try to infect you with.
They usually copy themselves to your Windows, System or System32 folder, they then modify
your system registry in order to make sure they are restarted on system start up.
No comments:
Post a Comment