1 00:00:08,470 --> 00:00:17,020 Let us continue our section with tradition in this lecture, we will learn what is a tradition, how 2 00:00:17,020 --> 00:00:22,990 hackers use tradition and the common ways of infecting systems with Trojan. 3 00:00:23,710 --> 00:00:24,730 What is a Trojan? 4 00:00:25,720 --> 00:00:33,310 Trojan is a program in which the malicious code is contained inside apparently or harmless programming 5 00:00:33,790 --> 00:00:41,590 or data in such a way that it can get control and cause damage, such as running the file allocation 6 00:00:41,590 --> 00:00:44,380 system into crash on the hard disk. 7 00:00:45,550 --> 00:00:57,670 Now, where this war Trojan came from is a Greek story in which the army of one state or one ruler entered 8 00:00:57,670 --> 00:01:04,090 into the state or province of another king via a Trojan horse. 9 00:01:04,780 --> 00:01:09,740 Now, though, there was only a horse and the army was hidden inside the horse. 10 00:01:10,570 --> 00:01:19,000 So in this way, this program or this piece of software storm that Struzan, because the malicious code 11 00:01:19,270 --> 00:01:22,780 is actually hidden inside a legitimate code. 12 00:01:23,740 --> 00:01:33,070 So, for example, if you download a software wagin from any website for free, but that software website, 13 00:01:33,070 --> 00:01:42,280 that software Virgin is bid on legal websites like Amazon, Flipkart, what you are interested in trying 14 00:01:42,280 --> 00:01:45,160 the free software because any of you are getting it for free. 15 00:01:45,880 --> 00:01:49,630 So you download it, you run it, you give it permissions. 16 00:01:50,230 --> 00:01:54,510 And after a few days you see that your computer is working very slow. 17 00:01:55,000 --> 00:02:00,000 Your resources are taking time to load through scandal. 18 00:02:00,310 --> 00:02:05,810 You are busy and you observe that your PC has been infected with malware. 19 00:02:06,250 --> 00:02:13,840 So how do you find out that since you downloaded the Free Virgin from a random website, the person 20 00:02:13,840 --> 00:02:23,200 who has uploaded that virgin also from the website may have inserted a malicious code behind illegal 21 00:02:23,200 --> 00:02:23,750 software. 22 00:02:24,430 --> 00:02:32,470 So a common person like we people, all the people who did not have much idea or who are fooled by the 23 00:02:32,470 --> 00:02:37,030 idea of getting birds of prey for free, they might not recognize it. 24 00:02:37,480 --> 00:02:45,520 And that is why downloading software from untrusted websites is one of the main reason why these Trojans 25 00:02:45,610 --> 00:02:48,490 get executed very efficiently. 26 00:02:49,090 --> 00:02:55,870 So Trojans get activated upon using certain predefined action and upon activation. 27 00:02:56,620 --> 00:03:00,510 So as a tool, you should download a software from a free website. 28 00:03:01,450 --> 00:03:09,430 Now you click the software as a run and you give the permissions to store the software details and data, 29 00:03:10,060 --> 00:03:16,180 which in turn means that you have given indirect permissions to the region itself. 30 00:03:16,750 --> 00:03:21,970 And that is why they get activated only upon user actions. 31 00:03:22,810 --> 00:03:30,940 Indications of what true attack include abnormal system and the network activities such as disabling 32 00:03:30,940 --> 00:03:41,770 of antivirus retardation to unknown pages, frequent pop ups at load resource loading and minimal plugins 33 00:03:41,770 --> 00:03:48,790 create a covert communication channel between the victim computer and the attacker for transmitting 34 00:03:48,790 --> 00:03:49,910 sensitive data. 35 00:03:50,800 --> 00:03:56,600 So through Trojan, that attacker can get your sensitive data. 36 00:03:57,490 --> 00:04:04,480 So in short, a Trojan acts like a bonafied application profile, which can easily trick you. 37 00:04:04,900 --> 00:04:11,590 So once the program is installed, a Trojan can perform the action it was designed for. 38 00:04:12,340 --> 00:04:15,640 The next question is how can hackers use Trojan? 39 00:04:16,900 --> 00:04:20,380 Well, plugins can delete or replace the system files. 40 00:04:21,010 --> 00:04:26,830 They can infect your system as a proxy so they can use your system as a proxy server. 41 00:04:28,740 --> 00:04:36,020 Then they can use the victim's PC for illegal purposes now, once they have access of your PC, they 42 00:04:36,020 --> 00:04:40,970 can perform any actions through your PC without revealing their own identity. 43 00:04:42,140 --> 00:04:45,480 Well, they can record screen shots or using videos. 44 00:04:46,130 --> 00:04:54,680 I remember one attack a group had claimed of are using the videos and recordings of the US president, 45 00:04:54,680 --> 00:04:55,780 Mr. Donald Trump. 46 00:04:56,390 --> 00:05:02,600 So there might be a chance that the White House computer had faced a cyber attack. 47 00:05:03,680 --> 00:05:08,150 The intrusions can also be used to disable antivirus and firewalls. 48 00:05:08,900 --> 00:05:11,330 They can also download malicious software. 49 00:05:12,530 --> 00:05:21,590 Well, have you even come across a pop up on your screen saying that there is an update for your PC? 50 00:05:21,590 --> 00:05:23,090 Please download the software. 51 00:05:23,480 --> 00:05:26,810 Whenever you visit a random website, it gives a pop up. 52 00:05:27,110 --> 00:05:29,420 Please download the software to upgrade your Kurume. 53 00:05:29,420 --> 00:05:31,270 Have ever received that pop up? 54 00:05:31,730 --> 00:05:39,710 Well, as a security expert, I would like to tell you that please do not go to those links and please 55 00:05:39,710 --> 00:05:46,250 do not click, because just by clicking those links, you give permissions to their software to get 56 00:05:46,250 --> 00:05:46,900 downloaded. 57 00:05:47,510 --> 00:05:53,600 So always download software from the legitimate sources. 58 00:05:54,030 --> 00:06:01,010 And if your friend or even if you download it from a non legitimate source before installing the software, 59 00:06:01,340 --> 00:06:04,570 make sure that you check the hashes of the software. 60 00:06:05,000 --> 00:06:06,560 Now, how to check the hashes. 61 00:06:06,950 --> 00:06:10,470 We are going to see that in the cryptography practicals. 62 00:06:11,540 --> 00:06:17,510 The next question is how to create a Trojan horse that was created Trojan. 63 00:06:17,960 --> 00:06:20,070 Well, the answer is very easy. 64 00:06:20,390 --> 00:06:22,190 You have the process in front of you. 65 00:06:23,390 --> 00:06:28,720 The first step is to create a new Trojan packet using a Trojan horse construction kit. 66 00:06:29,330 --> 00:06:35,330 All there are examples of many softwares which are readily available over the Internet to create a Trojan 67 00:06:36,230 --> 00:06:38,990 stepto then you have to create a dropper. 68 00:06:39,560 --> 00:06:40,720 Now, what is a dropper? 69 00:06:41,270 --> 00:06:47,290 Dropper is a part in the Trojan packet that installs the malicious code on the target system. 70 00:06:47,570 --> 00:06:54,750 So basically a dropper is a program that hides malicious code inside it. 71 00:06:55,580 --> 00:07:03,440 The next step is to create a proper or wrapper using the wrapper tools to install Trojan on the victim's 72 00:07:03,440 --> 00:07:04,080 computer. 73 00:07:05,240 --> 00:07:10,700 Then you have to propagate the Trojan that is standard solution to the victim, where emails, where 74 00:07:10,700 --> 00:07:11,690 social engineering. 75 00:07:11,840 --> 00:07:15,500 We have seen how hackers deploy these skills. 76 00:07:16,580 --> 00:07:21,470 Then the fifth step is to execute the drapeau, that is to install the legitimate call. 77 00:07:21,980 --> 00:07:25,530 And the last step is to execute the damage. 78 00:07:25,570 --> 00:07:31,540 Repeat that is, after installing the main program, attacker can install the Trojan. 79 00:07:32,610 --> 00:07:41,280 So in the next lecture, you will see different types of Perugian that are presently ruining victims 80 00:07:41,280 --> 00:07:42,200 and computers. 81 00:07:42,810 --> 00:07:49,830 So the next lecture would really help you to understand the Trojans and it may also help you to self 82 00:07:49,830 --> 00:07:51,450 assess your computers. 83 00:07:51,930 --> 00:07:56,100 So make sure you do not skip any of these lectures.