Trojan Horse | OWASP Foundation (2024)

Thank you for visiting OWASP.org. We have migrated our community to a new web platform and regretably the content for this page needed to be programmatically ported from its previous wiki page. There’s still some work to be done.

Description

A Trojan Horse is a program that uses malicious code masqueraded as atrusted application. The malicious code can be injected on benignapplications, masqueraded in e-mail links, or sometimes hidden inJavaScript pages to make furtive attacks against vulnerable internetBrowsers.

Other details can be found in Man-in-the-browserattack.

The 7 Main Types of Trojan Horse

  1. Remote Access Trojan (RAT): Designed to provide the attackerfull control of the infected machine. Trojan horse usuallymasqueraded as a utility.
  2. Data Sending Trojan: Trojan horse that uses keylogger technologyto capture sensitive data like passwords, credit card and bankinginformation, and IM messages, and sends them back to the attacker.
  3. Destructive Trojan: Trojan horse designed to destroy data storedon the victim’s computer.
  4. Proxy Trojan: Trojan horse that uses the victim’s computer as aproxy server, providing the attacker an opportunity to executeillicit acts from the infected computer, like banking fraud, andeven malicious attacks over the internet.
  5. FTP Trojan: This type of Trojan horse uses the port 21 to enablethe attackers to connect to the victim’s computer using FileTransfer Protocol.
  6. Security software disabler Trojan: This Trojan horse is designedto disable security software like firewall and antivirus, enablingthe attacker to use many invasion techniques to invade the victim’scomputer, and even to infect more than the computer.
  7. Denial-of-Service attack Trojan: Trojan horse designed to givethe attacker opportunity to realize Denial-of-Service attacks fromvictim’s computer.

Symptoms

Some common symptoms:

  • Wallpaper and other background settings auto-changing
  • Mouse pointer disappears
  • Programs auto-loading and unloading
  • Strange window warnings, messages and question boxes, and optionsbeing displayed constantly
  • e-mail client auto sending messages to all on the user’s contactslist
  • Windows auto closing
  • System auto rebooting
  • Internet account information changing
  • High internet bandwidth being used without user action
  • Computer’s high resources consumption (computer slows down)
  • Ctrl + Alt + Del stops working

Risk Factors

High: A Trojan horse can break through all security polices in anetwork, because an attacker can get access to a WorkStation with storednetwork credentials. With these credentials, an attacker can compromisethe whole network.

Examples

An iframe pointing to a javascript which downloads malware:http://isc.sans.org/diary.html?storyid=2923&dshield=4c501ba0d99f5168ce114d3a3feab567

[[Category:FIXME link not working

A Javascript Trojan Horse example can be found on:http://www.attacklabs.com/download/sniffer.rar .

]]

Related Attacks

  • TBD

Related Controls

  • TBD

References

Category:OWASP ASDR Projectneed links Category:Embedded MaliciousCodeCategory:Attack

Trojan Horse | OWASP Foundation (2024)
Top Articles
All About The XDC Network - Hybrid Blockchain
How to avoid ‘Port 4200 is already in use’ error with Angular-CLI? | Nexus Innovations
Cottonwood Vet Ottawa Ks
Unblocked Games Premium Worlds Hardest Game
Wellcare Dual Align 129 (HMO D-SNP) - Hearing Aid Benefits | FreeHearingTest.org
Guardians Of The Galaxy Showtimes Near Athol Cinemas 8
When is streaming illegal? What you need to know about pirated content
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
Craigslist Dog Sitter
United Dual Complete Providers
Missing 2023 Showtimes Near Landmark Cinemas Peoria
10 Great Things You Might Know Troy McClure From | Topless Robot
Purple Crip Strain Leafly
World History Kazwire
The Witcher 3 Wild Hunt: Map of important locations M19
Craigslist Blackshear Ga
Craigslist Free Stuff Santa Cruz
60 X 60 Christmas Tablecloths
Does Breckie Hill Have An Only Fans – Repeat Replay
St Maries Idaho Craigslist
Atdhe Net
Pecos Valley Sunland Park Menu
Chaos Space Marines Codex 9Th Edition Pdf
Joan M. Wallace - Baker Swan Funeral Home
Evil Dead Rise Showtimes Near Pelican Cinemas
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Holiday Gift Bearer In Egypt
R&S Auto Lockridge Iowa
Accuweather Minneapolis Radar
Jayme's Upscale Resale Abilene Photos
Carroway Funeral Home Obituaries Lufkin
What we lost when Craigslist shut down its personals section
Kuttymovies. Com
Earthy Fuel Crossword
Why Are The French So Google Feud Answers
Kattis-Solutions
Best Workers Compensation Lawyer Hill & Moin
Watchseries To New Domain
Restored Republic December 9 2022
Skyrim:Elder Knowledge - The Unofficial Elder Scrolls Pages (UESP)
Mars Petcare 2037 American Italian Way Columbia Sc
T&Cs | Hollywood Bowl
Gateway Bible Passage Lookup
Anguilla Forum Tripadvisor
Lacy Soto Mechanic
Alston – Travel guide at Wikivoyage
Noh Buddy
About Us
Bmp 202 Blue Round Pill
Madden 23 Can't Hire Offensive Coordinator
Brutus Bites Back Answer Key
R Detroit Lions
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6423

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.