

Such a program is designed to cause damage, data leakage, or make the victim a medium to attack another system.Ī Trojan will be executed with the same privilege level as the user who executes it nevertheless the Trojan may exploit vulnerabilities and increase the privilege.Īn important point is that not only the connection can be online (so that the commands or data are transmitted immediately between the hacker and victim), but also the communication can be offline and performed using emails, HTTP URL transmits or as the like. Technically defined, a Trojan horse is “a malicious and security-breaking program which is designed as something benign”. But actually the file is built of two applications which one of them is the harmless application, and the other one is the Trojan file. This application can be a flash card, flash game, a patch for OS, or even an antivirus. Sometimes the Trojan is combined with another application. The main characteristic of a Trojan is that first it should be executed by the user, second sends or receive data with another system which is the attacker’s system. The Trojans are most of the time defaced and shown as a legitimate and harmless application to encourage the user to execute them. This port can be even a well-known port such as 80 or an out of regular ports like 7777. Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system.
