|
trj: Tutorials: The Complete Windows Trojans Paper |
|
|
This is a paper about Windows Trojans, how they work, their variations and, of course, strategies to minimise the risk of infection.
Links to special detection software are included as well as many other topics never discussed before. This paper is not only intended to be for the average Internet/Windows user who wants to know how to protect his/her machine from Trojan Horses or just want to know about their usage, variations, prevention and future, but will also be interesting for the advanced user, to read another point of view.
Windows Trojans are just a small aspect of Windows Security but you will soon realise how dangerous and destructive they could be while reading the paper.
-------------------------------------------------------------------------------
Author's Notes: This is the updated version of my paper written a long while ago. During time I have seen it on every security/hacking site I came across and I'm you're all placing it in your archives as recommended reading. Now, many sections and updates have been added so be sure that you will reading new interesting aspects regarding the topic. The paper will answer many questions people keep asking in general about trojans like "how are attackers infecting me" and "how to protect from trojans". If you have any other questions about the topic including ideas, suggestions, comments, etc., please do not hesitate to express your opinion. If you have lot to say on the topic and/or I have missed some aspects then please contact me and contribute to the next update, and of course full credit will be given to you and your ideas.
-------------------------------------------------------------------------------
Table of Contents
-----------------
01.What Is This Paper About
02.What Is A Trojan Horse
03.How Do Trojans Work
04.Trojans Variations
-Remote Access Trojans
-Password Sending Trojans
-Keylogging Trojans
-Destructive Trojans
-Denial Of Service (DoS) Attack Trojans
-Proxy/Wingate Trojans
-FTP Trojans
-Detection Software Killers
05.The Future Of Windows Trojans
06.How Can I Get Infected
-Via ICQ
-Via IRC
-Via Attachments
-Via Physical Access
-Via Browser And E-mail Software Bugs
-Via Netbios(File Sharing)
07.Fake Programs
08.Untrusted Sites And FreeWare Software
09.How Are They Detecting My Internet Presence
10.What Is The Attacker Looking For
11.Intelligence With Trojans
12.Trojan Ports
13.How Do I Know I'm Infected
14.Anti-Virus (AV) Scanners
15.Anti-Trojan Software
16.After You Clean Yourself
17.Online Scanning Services
18.Advice
19.Links Section
20.Final Words
-------------------------------------------------------------------------------
1.What is this paper about?
-------------------------
The Complete Trojans Text is a paper about Windows Trojans, how they work, their variations and, of course, strategies to minimise the risk of infection. Links to special detection software are included as well as many other topics never discussed before. This paper is not only intended to be for the average Internet/Windows user who wants to know how to protect his/her machine from Trojan Horses or just want to know about their usage, variations, prevention and future, but will also be interesting for the advanced user, to read another point of view. Windows Trojans are just a small aspect of Windows Security but you will soon realise how dangerous and destructive they could be while reading the paper.
Full article and source:
Help-Net Security
|
|
|
|
|
Posted on Thursday, 24 October 2002 @ 10:00:00 EDT by Paul
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 4.33
Votes: 3
|
|
|