Feb 13, 2008

Different Kinds Of Trojans !!


Remote Access Trojans

These trojans are the most popular trojans now.Everyone wants to have such trojan because heor she want to have access to their victim's hard drive.The RAT'S (remote access trojans)are verysimple to use.Just make someone run the serverand you get the victim's IP and you have FULLaccess to his or her computer.They you canalmost everything it depends of the trojan you use.But the RAT'S have the common remote access trojan functions like:keylogger,upload and download function,make a screen shot and so on.Some people use thetrojans for malicious purposes.They want just to delete and delete.This is lame. There are many programs out therethat detects the most common trojans,but new trojans arecoming every day and these programs are not the maximum defense.The trojans do always the same things.If the trojan restart every time Windows is loaded thatmeans it put something in the registryor in win.ini or in other system file so the trojan can restart.Also the trojans create some file inthe WINDOWS\SYSTEM directory.The file is always lookingto be something that the victim will thinkis a normal WINDOWS executable.Most trojans hidefrom the Alt+Ctrl+Del menu.This is notgood because there are people who use only this way to seewhich process are running.There are programsthat will tell me you exactly the process and thefile from where it comes.Yeah but some trojansas I told you use fake names and it's a little hardfor some people to understand which processshould they kill.The remote access trojans opensa port on your computer letting everyone to connect.Some trojans has options like change the portand put a password so only the guy that infect youwill be able to use the computer.The changeport option is very good because I'm sure youdon't want your victim to see that port 31337 is openon their computer.Remote access trojans areappearing every day and they will continue to appear.For those that use such trojans: BE CAREFULyou can infect yourself and they the victim youwanted to destroy will revenge and you'll be sorry.

Password Sending Trojans

The purpose of these trojans is to rip all cachedpasswords and send them to specified e-mailwithout letting the victim about the e-mail.Most of these trojans don't restart every time Windowsis loaded and most of them use port 25 tosend the e-mail.There are such trojans that e-mailother information too like ICQ numbercomputer info and so on.These trojans are dangerous ifyou have any passwords cached anywhere on your computer

Keyloggers

These trojans are very simple.The only one thingthey do is to log the keys that the victim is pressingand then check for passwords in the log file.In the most cases these trojans restart everytime Windows is loaded.They have optionslike online and offline recording.In the online recordingthey know that the victim is online andthey record everything.But in the offline recordingeverything written after Windows start isrecorded and saved on the victims disk waiting forto be transferred.

Destructive

The only one function of these trojans is todestroy and delete files.This makes them very simpleand easy to use.They can automaticallydelete all your .dll or .ini or .exe files on your computer.These are very dangerous trojans and onceyou're infected be sure if you don't disinfect yourcomputer information will no longer exist.

FTP trojans

These trojans open port 21 on your computerletting EVERYONE that has a FTP client to connectto your computer without password and will full upload and download options.These are the most common trojans.They all are dangerousand you should me careful using them.

Google link units