Hacking For Beginners – Manthan Desai
2010
You just need to execute that software or application, you will find the application running or you might get anerror, but once executed the Trojan will install itself in the system automatically.
Once installed on a system, the program then has system-level access on the target system, where it canbe destructive and insidious. They can cause data theft and loss, and system crashes or slowdowns; they canalso be used as launching points for other attacks against your system.
Many Trojans are used to manipulate files on the victim computer, manage processes, remotely run commands,intercept keystrokes, watch screen images, and restart or shut down infected hosts.
Different Types of Trojans
1. Remote Administration Trojans: There are Remote Access Trojans which a re used to control the Victim’s computer
remotely.
2. Data Stealing Trojans: Then there are Data Sending Trojans which compromised the data in the computer, then
find the data on the computer and send it to the attacker automatically.
3. Security Disabler Trojan: There are Security software disablers Trojans which are used to stop antivirus software
running in the Victim’s computer.
In most of the cases the Trojan comes as a Remote Administration turns the Victim’s computer into a serve rwhich can controlled remotely. Once the Remote Access Trojan system, the attacker can connect to thatcomputer and can control it.
Some famous Trojans
Beast
Download - http://u.to/ZSSk
www.hackingtech.co.tv
Page 43