Sunday, November 20, 2005

Trojan Horses

Like their virus and worm counterparts, Trojan horses contain malicious code, but their designers don’t build them to replicate. Instead, designers disguise Trojan horses as safe programs that they want unassuming users to execute so the Trojan horses can work in the background to damage or steal data.
Trojan horses usually work in one of two ways: Either they allow access to a victim’s computer to upload other malicious programs or they use a victim’s computer for malicious administrative tasks.
Several years ago, many hackers (savvy computer users who break into systems for illegal and/or unethical purposes) found the SubSeven intruder tool to be extremely useful as a Trojan horse. Placed on a victim’s computer, the server portion of SubSeven lets a remote hacker browse the victim’s computer, open and close programs, edit the Windows Registry, and even use the computer as an FTP (File Transfer Protocol) server.

0 Comments:

Post a Comment

<< Home