Tuesday 9 August 2016

⁠⁠⁠Trojan, Virus and Worm..




Hey Friends,
Today, I am going to explain you "Terms Like ⁠⁠⁠Trojans, Viruses and Worms...
There are very useful things for the hackers to get the information about the victim.
They often use these skills to gain access to the victim's systems. The aim of targeting an organization or a victim to steal sensitive data or information and physically damage computer controlled equipment and many more. Trojans, viruses and worms can be used to help to complete above tasks.





Trojan


-The full name of Trojan is a "Trojan Horse".
-A Trojan horse is a kind of a program that allows the attacker/hacker to control the user’s computer from a remote location.
-The program "Trojan" comes with your additional applications that is useful for users.
-When the user install the application, then hacker is able to install malicious softwares, create backdoors, install other unwanted applications that can be used to damage your system.

Activities performed by hacker by using Trojan horse.

-Hacker is able to use the user’s computer as part of the Botnet.
-Damage the user’s computer (crashing, blue screen of death etc.)
-Stealing sensitive data(password,card number etc).
-Modifying files on the user’s computer
-Installs various software like keylogger.
-Viewing the user’s personal data (pictures,screenshot etc)
- Able to Downloading and access all the useful information.



  Worm

A worm is a malicious computer program that replicates itself usually over a computer network. An attacker/hacker use a worm to complete the following tasks...
-Install backdoors on the victim’s computers.
(The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks etc. the backdoors can also be exploited by other malware.Worms may also slowdown the network by consuming the bandwidth as they replicate.)
-Install harmful payload code carried within the worm.




Virus


-A virus is a computer program that attaches itself to legitimate programs and files without the user’s consent.
-Viruses can consume computer resources such as memory and CPU time.
-The attacked programs and files are said to be “infected”. A computer virus may be used to....
1-Access private data such as user id and passwords
2-Display annoying messages to the user
3-Corrupt data in your computer
4-Log the user’s keystrokes

These techniques involve deceiving the users to open the files which appear to be normal files such as word or excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.



Summary


Definition

Trojan - Malicious program used to control a victim’s computer from a remote location.
Worm - Self replicating program that attaches itself to other programs and files
Virus - Illegitimate programs that replicate themselves usually over the network

Purpose

Steal sensitive data, spy on the victim’s computer etc.
Disrupt normal computer usage, corrupt user data etc.
Install backdoors on victim’s computer, slow down the user’s network etc.

Precautions

-Use of anti-virus software (updated),
-Update patches for operating systems,
-Security policy on usage of the internet and external storage media etc.
⁠⁠⁠⁠-Take regular backup



By - Somesh Sah



ALSO READ -


VIRUS using BATCH Files









No comments:

WINDOWS SUBSYSTEM FOR LINUX

Microsoft partnered with Canonical (creator of Ubuntu) to bring Linux environment experience in Windows 10. Through Windows Subsystem F...