Headlines
Loading...
Types of Trojan | Countermeasures | how to prevent trojan virus

Types of Trojan | Countermeasures | how to prevent trojan virus

Trojan
Types of Trojans.
Command Shell Trojans.
           Command Shell Trojans are capable of providing remote access of command shell of victim. Trojan Server will open the port for command shell connection to its client application, installed on attacker's machine.

HTTP/HTTPS Trojans.
           HTTP and HTTPS Trojans bypasses the firewall inspection and execute on target machine. 

Botnet Trojans.
           A botnet is large scale of compromised system. These botnets are controlled by Command and Control Center. These botnets ar used to launch attacks such as Denial of Service, Spamming and other.

Defacement Trojans.
           By using this, attacker can view, edit and extract information from any Windows program. Attackers replaces the string, images, and logos often to leave their mark using this information. Attackers defaces programs using UCA.

Remote Access Trojans (RAT).
           RAT allows the attacker to get remote desktop access to victime PC by enabling Port which allows GUI access to remote system.
The list of RAT tools are as follows.
1- Black Hole RAT
2- Xtreme RAT
3- Pandora RAT
4- njRAT
5- ProRat
There are some other types of Trojans.
1- FTP Trojans
2- VNC Trojans
3- Data Hiding Trojan

Proxy Server Trojans.
           Trojan-Proxy Server is standalone malware application which is capable of turning the host system into proxy server. This Trojan allows the attacker to use victim's PC as proxy by enabling the proxy server on victim's system.
There are some other types of Trojans. These types are as follows.
1- ICMP Trojan                 6- Covert Channel Trojan
2- SPAM Trojan                 7- Credit Card Trojan
3- Document Trojan           8- E-banking Trojan
4- GUI Trojan                     9- Notification Trojan
5- E-mail Trojan               10 - MAC OS X Trojan

Trojan Countermeasures.
          A network or a system can be protected from most of the Trojans. It can prevent their system from Trojan attacks.
There are some countermeasures that we can use to prevent from trojan attacks and protect our system.
1- Avoid to click on Suspected Email Attachments.
2- Block unused ports
3- Avoid downloading file from Untrusted source
4- Enable Auditing

0 Comments:

Thanks for your comment.