You are on page 1of 2

Trojans

Trojan is a kind of computer program. It is similar to the wooden horse used by the Greeks in the war of
Troy. A trojan horse program pretends to do one thing while actually it is doing something completely
different.

Types of Trojans
01. Remote Administration Trojans(RATs)
02. Password Trojans
03. Key loggers
04. Destructive trojans

 Remote Administration Trojans(RATs)


Remote administration trojans are the most popular trojans. They let a hacker to access into
the victim’s hard disk. It perform many functions on victims computer like shut down computer,
open and close his CD-ROM drive etc.

 Password Trojans
Password Trojans search the victim’s computer for passwords and then send them to the
attacker or the author of the trojan. The passwords may be Internet password or an email
password. There is a trojan which used for every password. These trojans usually send the
information back to the attacker via Email.

 Key loggers
Key loggers Trojans are very simple. They log all of the victim’s keystrokes on the keyboard
including passwords. Then they either save them on a file or email them to the attacker. Key
loggers usually don’t take much disk space, thus making them very hard to detect.

 Destructive Trojans
Destructive Trojans can destroy the victim’s entire hard drive, encrypt or just scramble
important files.
Some popular Trojans
01. Back Orifice(BO)
Back Orifice(BO) trojan was developed by a community of hackers known as “Cult of the
dead cow’’(www.cultdeadcow.com). This Trojan can be downloaded from
www.BO2K.com and numerous other websites. Back Orifice(BO) consists of two parts-a
client application and a server application(approximately 122 KB). The client application,
running on the hacker’s computer, can be used to monitor and control the victim’s
computer which runs the server application.

02. Deep Throat v. 2


Was developed by a person called Cold killer, CEO of Darklight Corporation. The Trojan
delets the existing systray.exe file of the victim computer and replaces it with the server
portion of the Trojan. It can restart the victim computer and create dump in the victim’s
screen.

You might also like