Please enable JavaScript.
Coggle requires JavaScript to display documents.
TROJEN HOURSE (Categories or Types: (Denial of service (uses the infected…
TROJEN HOURSE
Delivered as:
- payload of another virus
- piece of malware
- through manual end-user action by downloading infected files
- inserting infected drives into a computer.
Once a computer is infected with a Trojan virus, the malware can:
- Steal end-user information
- Perform destructive harm on the target computer,
- download additional computer malware.
Categories or Types:
Denial of service
- uses the infected computer as a bot to attack another web server or computer.
Proxy
- designed to make the infected computer act as a proxy server. As a result of the infection, the targeted computer can then be used by other to surf the Internet anonymously.
Key logger
- designed to record the keystrokes on an infected computer and then send the log files to a remote server or email account.
FTP
- one of the most basic Trojan viruses and is one of the most outdated. The primary purpose of the malware is to open port 21 on the infected computer. Once opened, anyone can then connect to the computer using the FTP protocol.
Destructive
- Trojan virus‘s primary purpose is to delete or remove files on the targeted computer.
-
Credentials Harvesting
- malware will search for all cached usernames, and passwords and copy those entered by the end-user
Trojan downloaders
- download additional computer malware onto the infected computer.
Remote access
- virus will give the hacker/attacker full control over the targeted computer equivalent to the user‘s permissions
Consist of:
- server
- client component : portion of the malware that infects the end user’s computer. Once established or executed, the virus can be designed to establish a certain level of control over the infected computer.
:star: It doesn't only damages the host computer by manipulating the data but also it creates a backdoor in the host computer so that it could be controlled by a remote computer.
:star: It can become a part of botnet (robot-network), a network of computers which are infected by malicious code and controlled by central controller. The computers of this network which are infected by malicious code are known as zombies