Custom Search

15 July 2008

Kind of Trojan

kind Trojan as in the case of the virus, had a sufficient number and developed together with passing of time. Gotten approximately 650 trojan that circled at this time. From however many kinds Trojan,virus this could in the group became eight kinds, between lan as follows:

1. Trojan Access Re- beads.
the process trojan this was to be waiting for someone that undertook Trojan that functioned as Server and if the aggressor got IP casualties then the aggressor could control fully casualties's computer.The Trojan example this kind was the back Orifice (BO).

2. Trojan the Password Sender
The aim of trojan this was sent password that was in casualties's computer or in the internet to a special email that has in prepared. Most of Trojan this used Port 25 to send the email.

3.Trojan File Transfer of Protocol (FTP)
The Only function that was undertaken was to open Port 21 in casualties's computer that facilitated someone had FTP client to enter casualties's computer without password as well as did download or upload file.
4. Keylogger
Fungtion that recorded or recorded the switch knock when casualties carried out typing and kept him in logfile.Proses the recording was carried out during windows was undertaken.

5. Trojan destroyed
The Only function from trojan this was destroyed and removed file. Trojan this automatically removed all file the system to the newspaper computer (for example :*.dll, *.ini, atau*.exe.

6. Trojan Denial Of Service (DoS)
Attack Trojan this had the capacity to undertake Distributed DoS (DDoS) .Gagasan especially was if the aggressor had the user's 200 casualties ADSL that was infected, afterwards began to attack casualties together. Results were the data traffic that was very solid because of the repeated request and exceeded the band capacity width casualties. This caused internet access to was closed.

7. Trojan Proxy/Wingate
Trojan Proxy /Wingate was used to Telnet that was anonymous, ICQ,IRC, and to register the domain with momor the credit card that was stolen as well as to kativitas other that was illegal. Trojan this supplemented the aggressor with the anonymous situation and gave the opportunity to do all of them against casualties's computer and the tracks him could not be investigated.

8. Software Detection Killer
Some Trojan was supplemented with the capacity to paralyse the Software function the detector. When Software the other detector was paralysed, the aggressor will have access was full to casualties's computer, carried out several illegal activities, and used casualties's computer to attack the other computer.


0 comments:

Post a Comment

pleace don't be spam

 
xn--10055-c00l © gie.doank@gmail.com Tank's