Hacking For Beginners – Manthan Desai

2010

You just need to execute that software or application, you will find the application running or you might get anerror, but once executed the Trojan will install itself in the system automatically.

Once installed on a system, the program then has system-level access on the target system, where it canbe destructive and insidious. They can cause data theft and loss, and system crashes or slowdowns; they canalso be used as launching points for other attacks against your system.

Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands,intercept keystrokes, watch screen images, and restart or shut down infected hosts.

Different Types of Trojans

1. Remote Administration Trojans: There are Remote Access Trojans which a re used to control the Victim’s computer

remotely.

2. Data Stealing Trojans: Then there are Data Sending Trojans which compromised the data in the computer, then

find the data on the computer and send it to the attacker automatically.

3. Security Disabler Trojan: There are Security software disablers Trojans which are used to stop antivirus software

running in the Victim’s computer.

In most of the cases the Trojan comes as a Remote Administration turns the Victim’s computer into a serve rwhich can controlled remotely. Once the Remote Access Trojan system, the attacker can connect to thatcomputer and can control it.

Some famous Trojans

Beast

Download - http://u.to/ZSSk

www.hackingtech.co.tv

Page 43