Essay on The Trojan Conceiling, Technology

798 Words 4 Pages
The Trojan concealing technology- Taking advantage of System Services Case study
The definition of Trojan Trojan in the computer world is a program that can permeate the whole system without victim’s awareness. The Trojan runs in the victim system, like a spy that sneaks into enemy and opens back door for other kinds of attacks. This is like the Trojan strategy in real war, so the program is called “Trojan Horse” or “Trojan”. Trojan usually includes two executable programs: client and server. The Trojan that hides in the victim system is the server, and the so-called “hacker” uses the client as the control terminal. Once the server runs, it will open one or more ports on the victim system, initiating contact with the client and
…show more content…
The Trojan concealing technology- Taking advantage of System Services Case study
The definition of Trojan Trojan in the computer world is a program that can permeate the whole system without victim’s awareness. The Trojan runs in the victim system, like a spy that sneaks into enemy and opens back door for other kinds of attacks. This is like the Trojan strategy in real war, so the program is called “Trojan Horse” or “Trojan”. Trojan usually includes two executable programs: client and server. The Trojan that hides in the victim system is the server, and the so-called “hacker” uses the client as the control terminal. Once the server runs, it will open one or more ports on the victim system, initiating contact with the client and receive orders from client. In this way, the hacker can steal information from the victim system, do harm to the system, or even destroy the whole system.
Trojan Concealing Technology A good Trojan program must have a good ability to survive. In order to avoid being noticed, the Trojan In windows operating system, if you register one process as system service, then the user cannot use Task Manager that the system provided to see the malicious process. So some Trojans easily accomplish the purpose of hiding themselves in running mode by registering themselves as system services.
In this paper, the Trojan whose family name is “TrojanDropper:Win32/Zegost” is analysed. Firsly, the Trojan will obtain all the processes which share the system

More about Essay on The Trojan Conceiling, Technology

Open Document