Some of Typical Remote Attacks

Higher Level


The Attack

The Attack Level & Response

The Attacker & Victim's OS

> Some Forms <

Back

A trojan horse program can be a program that does something useful, or merely something interesting. It always does something unexpected, like steal the password or copy files without your knowledge.

A trojan can come in any form. It can be a utility that purports to index file directories or unlock registration codes on software. It can be a word processor or a network utility. In short, a trojan can do anything and can be found in anything.

Programmers create trojans, usually with ill intent. The programmer who write trojans knows what he is doing, and he will use the trojan to do one of the two things:

  • perform some function that either reveals the programmer vital and privileged information about the system or compromise that system.
  • Conceal some function that either reveals to the programmer vital and privileged information about the system or compromise the system. Some trojans do both.
Back