Ethical Hacking 简明教程
Ethical Hacking - Trojan Attacks
特洛伊木马是非复制程序;它们不会通过附着到其他可执行代码来复制自己的代码。它们在未经计算机用户许可或不知情的情况下运行。
Trojans are non-replication programs; they don’t reproduce their own codes by attaching themselves to other executable codes. They operate without the permissions or knowledge of the computer users.
特洛伊木马隐藏在正常进程中。然而,我们应该强调,特洛伊木马只在计算机用户的帮助下感染外部机器,例如点击来自陌生人的电子邮件附件文件、不扫描就插入 USB、打开不安全的 URL。
Trojans hide themselves in healthy processes. However we should underline that Trojans infect outside machines only with the assistance of a computer user, like clicking a file that comes attached with email from an unknown person, plugging USB without scanning, opening unsafe URLs.
木马有几种恶意功能 −
Trojans have several malicious functions −
-
They create backdoors to a system. Hackers can use these backdoors to access a victim system and its files. A hacker can use Trojans to edit and delete the files present on a victim system, or to observe the activities of the victim.
-
Trojans can steal all your financial data like bank accounts, transaction details, PayPal related information, etc. These are called Trojan-Banker.
-
Trojans can use the victim computer to attack other systems using Denial of Services.
-
Trojans can encrypt all your files and the hacker may thereafter demand money to decrypt them. These are Ransomware Trojans.
-
They can use your phones to send SMS to third parties. These are called SMS Trojans.
Trojan Information
如果您发现了病毒并希望进一步调查其功能,那么我们建议您查看以下通常由防病毒供应商提供的病毒数据库。
If you have found a virus and want to investigate further regarding its function, then we will recommend that you have a look at the following virus databases, which are offered generally by antivirus vendors.
-
Kaspersky Virus database − https://www.kaspersky.com
-
F-secure − https://www.f-secure.com
-
Symantec – Virus Encyclopedia − https://www.symantec.com