What is Trojans Virus and How it Work

What is Trojans Virus and How it Work

What is Trojans Virus and How it Work:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of ethical hacking cyber programming. And also we will describe that how can we use ethical hacking for our safety.This is the free ethical hacking tutorials: course for Beginners  And why we  use  ethical hacking  to make  more interactive and  secure for our daily life. Best Online Tutorial for ethical hacking.When ever we want to learn any thing the things become more earlier is somebody/tutorial/study material taught us through Examples. Here we have tried to describe each and every concept of  Ethickal and Cyber Security   in the light of cyberpoint9.com  best Hindi  Short tutorial using simple and best possible example. meaning of Trojan virus in Computer in hindi. These examples are so simple that even a beginner who had never even heard about hacking and Cyber law can easily learn and understand How  the  Ethical Hacking works in our today’s Technical Field. This is  the best  tutorial/Study Material  very beneficial for beginners  as well as Professional. The Complete Ethical Hacking Course:Beginner to Advanced for Every One!

NAT – Network Address Translation :

This is the virtual network which mapped the public ip address into private and vice versa.

Definition and Meaning  of TROJANS
=======

Trojans are the malicious applications or programs which looks like a normal application but is harmful in nature as it can give the whole remote access of the Target’s Machine to the Attacker’s Machine.

TYPES OF TROJANS ON THE BASIS OF CONNECTION
===========================================

Reverse Connection Trojan : A reverse connection Trojan is that in which we don’t have to get or know the IP Address of the Victim’s Machine. You just have to create a Trojan having the Attacker’s IP Address only.

———————————————————-

DEPLOYING OF TROJAN IN THE TARGET’S MACHINE and How it Work
===========================================

1. DEPLOYING IN THE SAME NETWORK : The attacker just have to create a Trojan of the IP in the same network where a Target is residing.

2. DEPLOYING TROJAN GLOBALLY : In this Scenario, a Attacker is using a Globally hosted DNS with a global IP to get a reverse connection from a Target to itself. For eg. Using NOIP and Port Forwarding.

———————————————————-

What is RAT(Remote Administration Tool) How to Use
===
RAT stands for Remote Administration Tool. It helps in creating Malware’s like Trojans and Viruses which provides Remote Connection of a Victim Machine while not letting know the Victim about it.

———————————————————-

CREATION OF TROJANS
===================

= IP + PORT = Socket
= Stub = The Malicious Trojan we make through Dark Comet.

1. Left top corner = DarkComet-RAT
2. Go to “Server Module” = Full Editor(expert)
3. Main Settings = Process Mutex

Mutex = Thread which helps me in sharing the computer’s resources
Random Process Mutex
Server ID = Same|Change
Profile Name = Same|Change

4. Goto Network Setting
Insert Private IP Address and a port number(greater than 1200)
Socket = IP Address + Port Number
IP Address = Private IP Address –> 192.168.0.28
Port Number = 1604
CLick On “ADD”

5. Goto “Module Startup” = When my computer start, then what are the things which my Trojan will do.
Check box the “Start the stub with windows”
Drop the stub in:

6. Goto Install Message
Tick the check box
Choose the icon
Enter the you want the user to display

7. Goto Module Shield
8. File Icon
Choose any file icon from the list.
9. Goto Stub Finalization
Build This Stub
Destination for saving the stub

10. To listen on a specific port
port = 1604
In the dark comet screen, top left corner = DarkComet-RAT = Click on that
Click on “Listen to new port”
enter the port number = 1604 and click on listen


EVADING ANTIVIRUSES AND ANTI-MALWARE’S(Safety From Trojans)
====================================

HOW ANTIVIRUSES WORKS
=====================
Antiviruses and Anti-malware’s works on the definitions or called signatures of an application. If they found that a Signature of a Application is malicious, they will declare the application as a malware and if not they will declare it as a normal running application.

https://www.youtube.com/watch?v=bTU1jbVXlmM

FUD – Fully Undetectable

What are CRYPTERS AND BINDERS
====================

Crypters are those applications which helps as a extra coating layer to an application providing there own self generated “Signatures”. Eg. Chrome Crypter, Urge Crypter

Binders are those applications which binds a file or a malware in any extension while not changing the functionality of the filetype.

Chrome & Urge Crypters = Limbo > Bingo

———————————————————-

What are BOTNETS AND ROOTKITS and How it Work
====================

Botnets means robot+Network. These are the malicious applications such as Trojans etc.. which runs on the Network and are intelligent enough to use there own mechanism.

Rootkits
========Rootkits are those Malicious Applications or Codes which are installed in the Boot option such as BIOS and start executing on every startup.

———————————————————

HOW TO SECURE SYSTEM CONFIGURATION
===========================

1. CMD > $ netstat -ona
(This will show all the Sockets : IP+Port Connections with their Stats of that particular machine)
= o stands for ports
= n stands for network IPs
= a stands for all connections

2. CMD > tasklist
CMD > $ taskkill /PID ___ /F

3. Startups Check and Maintaining the list of the Machine.

4. Task Manager > Processes > kill PID (Process ID) of the Malicious Executable(exe)

5. Checking Firewall status and making and creating new Rules Sets. > Outbound Rules & Inbound Rules

6. Services running on the Machine.


Do It By Your Self and then Comment on My Website For the Solution


1. Create a POC by making a Stub and getting the Remote Connection of a Machine.
2. Report on the World’s First Antivirus.
3. Find an application which can see the “Established” and “Listening” connection of a machine just like “netstat”.

https://ufile.io/218hp


 

Tagged with: , , , ,
3 comments on “What is Trojans Virus and How it Work
  1. Hi there! This post couldn’t be written any better! Reading through this post reminds me of my previous room mate! He always kept talking about this. I will forward this article to him. Pretty sure he will have a good read. Thank you for sharing!

  2. Bong Dafoe says:

    I’m really loving the theme/design of your site. Do you ever run into any browser compatibility issues? A number of my blog visitors have complained about my site not working correctly in Explorer but looks great in Safari. Do you have any recommendations to help fix this problem?

  3. I appreciate you sharing this blog article. Much obliged.

1 Pings/Trackbacks for "What is Trojans Virus and How it Work"
  1. […] For More About Trojans Click Here:- What is Trojans Virus and How it Work […]

Leave a Reply

Your email address will not be published. Required fields are marked *

*