1 00:00:08,200 --> 00:00:16,120 In the last lecture, we saw what our Trojans and we have a brief introduction about Trojans in this 2 00:00:16,120 --> 00:00:22,190 lecture, we will see different types of plugins and how these Trojans work. 3 00:00:23,260 --> 00:00:31,990 So before moving ahead with the types of Trojans, let us foresee an example of how a Trojan can affect 4 00:00:31,990 --> 00:00:32,510 a system. 5 00:00:33,280 --> 00:00:40,900 So the first step is Anadarko's send an e-mail to a victim containing link to the Trojan server. 6 00:00:41,200 --> 00:00:47,050 The victim clicks the link and immediately connects the Trojan server in exquisite country. 7 00:00:48,390 --> 00:00:52,240 And then the Trojan is sent to the victim from the server. 8 00:00:53,170 --> 00:01:02,380 Victim installs the Trojan infecting his machine and finally attacker connects to the victim's machine 9 00:01:02,770 --> 00:01:06,560 because the user himself or herself has given permission. 10 00:01:07,600 --> 00:01:16,870 That is why security experts always tell you to pay the price for legitimate software rather than just 11 00:01:16,870 --> 00:01:18,380 downloading it for free. 12 00:01:19,560 --> 00:01:27,720 The first, Drugeon, is the remote access Trojan, which is a very common Trojan these days, and you 13 00:01:27,720 --> 00:01:29,910 might have heard of the stone often. 14 00:01:30,780 --> 00:01:37,920 What is a remote access Trojan remote access Trojan works like a remote and stop access. 15 00:01:39,040 --> 00:01:45,680 Hacker gains complete access to the remote system, considered an example. 16 00:01:46,630 --> 00:01:56,140 Jason, the attacker, in fact, his computer with server dot XY file and plans a reverse connect intrusion 17 00:01:57,370 --> 00:02:04,600 that connects the Port Authority to the attacker in Russia, establishing a reverse connection that 18 00:02:04,630 --> 00:02:04,780 would. 19 00:02:04,780 --> 00:02:09,850 Jason, the attacker has complete control over Rebecca's machine. 20 00:02:10,480 --> 00:02:13,030 A common example of remote access. 21 00:02:13,030 --> 00:02:16,790 Trojan is Engelhard Energy. 22 00:02:16,880 --> 00:02:24,850 That is a remote access Trojan that can download and execute additional malware, execute shell commands, 23 00:02:25,450 --> 00:02:34,680 read and write, register Ricki's capture screenshots, lock keystrokes, spy on web cams and many more. 24 00:02:35,500 --> 00:02:41,650 Other examples of red include a more Soko product, PPIF. 25 00:02:42,890 --> 00:02:47,840 Alcindor Gady Red deselect August. 26 00:02:48,880 --> 00:02:58,570 Net, while Djavad and many more there are specific tools to create remote access Trojan and as you 27 00:02:58,570 --> 00:03:06,760 can see on the screen, the attacker has hacked the server and then connected to the infected PCs. 28 00:03:07,150 --> 00:03:09,810 Other Trojans are Back-Door Trojans. 29 00:03:10,690 --> 00:03:12,060 What is a backdoor Trojan? 30 00:03:13,120 --> 00:03:20,990 A backdoor is a program which bypasses the systems, costumery security mechanisms to gain access to 31 00:03:20,990 --> 00:03:23,620 a restricted area of a computer system. 32 00:03:24,640 --> 00:03:30,340 Black widows are used by the attacker to have uninterrupted access to target machine. 33 00:03:31,320 --> 00:03:36,670 A great example of a backdoor Trojan is poison ivy. 34 00:03:37,990 --> 00:03:44,070 Poison ivy gives the attacker practically complete control over the infected computer. 35 00:03:44,890 --> 00:03:52,540 Once the backdoor is executed, it copies itself to the other Windows holder or the Windows system totally 36 00:03:52,540 --> 00:03:53,170 to follow. 37 00:03:53,890 --> 00:04:01,000 The next type of illusion that we are going to see is the rootkit intrusion, right? 38 00:04:01,300 --> 00:04:08,950 Rootkit Trojans are considered as powerful back doors that specifically attack the root that is the 39 00:04:08,950 --> 00:04:17,290 operating system compared to the other vectors rootkit cannot be detected by observing social services 40 00:04:17,830 --> 00:04:20,320 system, task list or registries. 41 00:04:21,310 --> 00:04:28,120 Rootkit consists of three components Drapeau, LoDo and rootkit itself. 42 00:04:29,320 --> 00:04:37,060 Examples of rootkit are wislow, CPV, fish, wakeboard, etc.. 43 00:04:38,110 --> 00:04:44,020 If you really have interest, you can go over the Google and search these types of rootlets. 44 00:04:45,670 --> 00:04:48,610 The next intrusion is important intrusion. 45 00:04:49,960 --> 00:04:58,630 Botnet Trojans infect a large number of computers across a large geographical area to create a network 46 00:04:58,630 --> 00:05:03,900 of bots that is controlled through a command line and command server. 47 00:05:03,910 --> 00:05:05,630 That is the NSA center. 48 00:05:06,670 --> 00:05:13,930 Basically, botnet is used to launch various attacks on a victim, including denial of service attacks, 49 00:05:14,470 --> 00:05:21,040 email, spamming, click fraud and the theft of financial information. 50 00:05:22,660 --> 00:05:24,870 The next intrusion is very interesting. 51 00:05:25,330 --> 00:05:27,130 It is very common these days. 52 00:05:27,790 --> 00:05:31,600 That is the Ebanks intrusion into banking. 53 00:05:31,600 --> 00:05:39,490 Trojans, as the name suggests, intercept a victim account information before it is encrypted and send 54 00:05:39,490 --> 00:05:43,120 it to the attackers Trojan Command and control system. 55 00:05:44,380 --> 00:05:53,110 It steals victims data such as credit card c.v, no billing details, account number, bank details, 56 00:05:53,770 --> 00:05:56,470 passwords, email, etc.. 57 00:05:58,380 --> 00:06:01,320 Then how will you including books? 58 00:06:01,840 --> 00:06:12,690 Well, they can work through GraBois form Grabau, which collect the data H.M.S. and good credentials. 59 00:06:14,670 --> 00:06:18,200 So this is how you banking intrusion can work. 60 00:06:19,380 --> 00:06:24,120 The next step of proving that we are going to see is a proxy server. 61 00:06:26,010 --> 00:06:33,630 Well, as the name suggests, prudent proxy is usually a standalone application that allows the remote 62 00:06:33,630 --> 00:06:38,850 attackers to use the victim's computer as a proxy to connect to the Internet. 63 00:06:40,200 --> 00:06:50,580 Let us consider Bob has attacked Alice's computer via Trojan and has placed a proxy so to do any illegal 64 00:06:50,580 --> 00:06:51,360 activities. 65 00:06:51,880 --> 00:07:00,330 Bob accesses the Internet where Alice is computer telling the Internet that Alice is doing commands 66 00:07:00,330 --> 00:07:08,500 on behalf of job so that I'm sorry on behalf of Bob so that Bob's real identity is hidden. 67 00:07:09,180 --> 00:07:13,570 The next type of Trojan is a devious intrusion defacement. 68 00:07:13,570 --> 00:07:22,200 Trojan allow a user to view, edit, extract and replace strings, bitmap logos and icons from any Windows 69 00:07:22,200 --> 00:07:22,620 program. 70 00:07:23,680 --> 00:07:30,450 They allow attackers to view and edit almost any aspect of a Comp. Windows program. 71 00:07:31,110 --> 00:07:34,450 All these intrusions are very restrictive in nature. 72 00:07:34,650 --> 00:07:40,530 There are other provisions like mobile perugian Internet of Things, grugeon, destructive Trojans, 73 00:07:40,950 --> 00:07:43,020 hacking Trojans and many more. 74 00:07:43,650 --> 00:07:49,980 In the next lecture, we are going to talk about one of the most commonly discussed topics around the 75 00:07:49,980 --> 00:07:51,720 globe that is viruses. 76 00:07:52,380 --> 00:08:00,030 Anything happens on your computer if you ask your parents or your relatives or you and your friends. 77 00:08:00,060 --> 00:08:02,120 The common answer is virus. 78 00:08:02,610 --> 00:08:04,500 Well, the text explore virus.