You are on page 1of 17

STRUCTURED ENGLISH TASK TROJAN HORSE

Compiled by : Grup 5 1. Made Manik Datu Yasa 2. Wisu Edy Putra Hutama 3. Samsul maarif 4. Bella Aulia R. 5. Elis Maulidiyah (125150301111030) (125150301111032) (125150301111033) (125150301111031) (125150301111034)

PROGRAM TEKNOLOGI INFORMASI

DAN
ILMU KOMPUTER UNIVERSITAS BRAWIJAYA

TABLE OF CONTENT
PREFACE ...........................................................................................................i TABLE OF CONTENT ......................................................................................ii CHAPTER I INTRODUCTION ......................................................................... 1.1 Background ......................................................................................... 1.2 Formulation of The Problem ............................................................... 1.3 Purpose of writing ............................................................................... CHAPTER II DISCUSSION .............................................................................. 2.1 Introducing Of ProRat Software ......................................................... 2.2 Create a Trojan Horse Server By Prorat ............................................. 2.3 Trojan Horse Configuration ................................................................ 2.4 Solution Of Trojan Horse .................................................................... CHAPTER III CLOSING ................................................................................... 3.1 Conclusion .......................................................................................... 3.2 Suggestion ........................................................................................... CHAPTER IV REFERENCES ........................................................................... CHAPTER V QUESTION SECTION ................................................................ CHAPTER VI BIOGRAPHY .............................................................................

PREFACE

Praise be to Allah SWT. Prayers and peace be always devoted to the Prophet Muhammad saw. Thanks to the abundance of His grace and author of this paper is able to complete the task in order to fulfill the task of the English language courses In preparing this paper the task, not a few obstacles that we face. Dont forget we like to thaks to : 1. Pratnya as our english lecturer that always support us 2. Our parent that always pray and support for us every moment 3. Our friend that has given more spirit everytime. The paper is organized so that readers can expand knowledge about Trojan horses, which we present is based on observations from a variety of resources, references, and news. The paper is structured with various obstacles. But with patience and the help of God especially finally this paper can be resolved. Hopefully, this paper can provide greater insight and to contribute ideas to the readers especially the students of UB. We are aware that this paper is still a lot of flaws and is far from perfect. Therefore, to our English lecturer asks input for improving our paper making in the future and expect criticism and suggestions from readers.

Malang, May 5th 2013

Grup 5

CHAPTER I INTRODUCTION

1.1 Background The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the city of Troy and end the conflict. In the canonicalversion, after a fruitless 10-year siege, the Greeks constructed a huge wooden horse, and hid a select force of men inside. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greeks entered and destroyed the city of Troy, decisively ending the war. The main ancient source for the story is the Aeneid of Virgil, a Latin epic poem from the time of Augustus. The event does not occur in Homer's Iliad, which ends before the fall of the city, but is referred to in the Odyssey. In the Greek tradition, the horse is called the "Wooden Horse" ( ,Doreios Hppos, in the Homeric Ionic dialect). Metaphorically a "Trojan Horse" has come to mean any trick or stratagem that causes a target to invite a foe into a securely protected bastion or space. It is also associated with "malware" computer programs presented as useful or harmless to induce the user to install and run them. As the name implies, trojan Horse took the idea of the history of ancient troy war. Trojan horses first made in ..., Trojan horses is one of the dangerous trojan ever made. trojan horse that managed to infect the victim's computer and run the appropriate commands will perform the task of creator (hackers). Trojan horses can be created with a software called ProRat Software. ProRat can be downloaded free at www.prorat.com is an open source program. Trojan horse that has been successfully run and infect the victim's computer will perform tasks as instructed, include making warning pop up windows, format local disk from the victims computer, shutdown victim computer, and other.

1.2 Formulation of The Problem How Trojan Horse Created ? How Trojan Horse infect the Victim Computer? How many configuration that trojan horse has to infect the Victim computer ? How the solution for the victim to avoid from trojan horse ?

1.3 Purpose of Writing To give information how Trojan Horse broke the victim computer. Give solution for the reader to avoid this trojan infect their computer. Avoid from cyber crime. Add knowledge about Trojan Horse.

CHAPTER II DISCUSSION

2.1 Introducing Of ProRat Software Trojan horse created by software that called ProRat software, its a kind of open source software, so it can be downloaded for free at www.prorat.com. Its a simple way to create a Trojan horse by ProRat software. ProRat is a Microsoft Windows based backdoor trojan horse, more

commonly known as a RAT (Remote Administration Tool). As with other trojan horses it uses a client and server. ProRat opens a port on the computer which allows the client to perform numerous operations on the server (the machine being controlled). ProRat is available in a free version, and a paid version. In the free version, ProRat cannot connect to users over wide area networks (WANs), only over LANs (Local Area Networks). ProRat is known for its server to be almost impossible to remove without up-to-date antivirus software.

Image 2.1 ProRat software

2.2 Create a Trojan Horse Server By Prorat

2.3 Trojan Horse Configuration There is 5 Configuration that has maked by ProRat Software to build a

Image 2.2 Created Trojan Horse

dangerous trojan like trojan horse : 1) Notification 2) General Setting 3) Bind with file 4) Server Extension 5) Server Icon

2.3.1 Notification When the victim's computer has infect by this trojan, it will record anything about information of your computer and send to the hacker when your computer has connected to the internet.

When Victim Infected Horse, Trojan will

Image 2.3 Notification

Computer send all

Trojan the

information from the victim's computer to a hacker via network. ProConnective Notification

This notifications works when connect via LAN network, the information will be transmitted over the LAN network message. Mail Notification

This notification works if the victim's computer is online, the information will send from the victim computer to hacker by email.

2.3.2 General Setting In this Configuration The hacker can send an order to Trojan Horse that has infect to the victim computer. The hacker can do anything, such us : turn off security center, turn off windows firewall, kill the antivirus process, deleted restore point, Kill Task Manager, Format Memory, and other.

General configuration setting is a form of the command, if the trojan has been successfully running on the victim's computer. Hackers will send commands to the IP client / ip victim's computer. Given such orders, turn off security center, turn off the windows firewall, antivirus kill the process, deleted restore points, Kill Task Manager, Format Memory, and other. Then the trojan ready to Perform command. Image 2.4 General Setting

2.3.3 Bind With File

In this configuration Trojan horse can be combine with file, its like picture, document, application, games, etc. So if hacker send some game, or application to the victim that combine by trojan horse, and he click it, suddenly Trojan horse will run and working to the victim computer.

Image 2.5 Bind With File Hacker Combining Trojan Horse With files using software prorat. Trojan that has been in the combine, has already given to the victim. If the Trojans succeed in clicks and successfully run on a computer the trojan will immediately infect the entire contents of the victim's computer. Hackers are ready to destroy the victim's computer

2.3.4 Server Extensions In this configuration, Trojan horse Extention can be set to Any Extention of file, such us : Exe, jpeg, pdf, doc, mp3, etc.

Image 2.6 Server Extention

So, its surely will blind victim eye, and most likely the victim will run the program. Hackers Change the extension is using the Trojan Horse software prorat. Trojan has been the change in extensinya ready to give to the victim. If the Trojans succeed in clicks and successfully run on a computer the trojan will immediately infect the entire contents of the victim's computer. Hackers are ready to destroy the victim's computer.

2.3.5 Server Icon In this configuration, trojan horse icon can change to any icon by hacker. Icon that usually change by hacker such us : Microsoft Office icon, Windows Media Player, Zip, Notepad, etc.

Image 2.7 Server Icon Changing Icon Hacker Trojan Horse With files using software prorat. Trojan has replaced its icon is ready to give to the victim. If the Trojans succeed in clicks and successfully run on a computer the trojan will immediately infect the entire contents of the victim's computer.

2.4 Solution Of Trojan Horse The is some solution how to prevent this dangerous trojan run to victim computer, such us : 1. Keep your best Antivirus up to date 2. Always Check your windows firewall, never turn it off 3. Avoid use pirated software, because most it has many kind of virus or trojan inside. 4. Avoid use Patch, Crack, and dont install it as Recommended.

CHAPTER III CLOSING

3.1 Conclusion From all of statement Above, we know that if trojan horse infect to victim computer, it will too dangerous to the victim computer. The hacker can do anything to victim computer by trojan horse. You can imagine how it so dangerous if the trojan delete some files or maybe format our Hdd or delete some important document. So, the only way maybe yo should do, is Reinstall your Computer windows, and repair your computer windows. Or the trojan will extremely dangerous in your computer windows.

3.2 Suggestion In the era of information technology, the person required to be able to use technology to the best of its kind. other than that, people are required to know the crime in the technology, in order to avoid all these health benefits. Trojan horse is one of the tools commonly used by hackers in committing crimes in cyberspace. since it was first created Trojan horse able to paralyze the victim without the victim's computer looks. The papers are expected to be useful for the reader to be more careful - careful in using technology.

CHAPTER IV REFERENCES

CHAPTER V QUESTION SESSION

CHAPTER VI BIOGRAPHY

Made Manik Datu Yasa, he was born on September, 26th 1994 in Rogojampi, Banyuwangi, Jawa Timur. Hes a last son from I Gede Adi Putra and Kadek Hindawati. He Started his Studies in 1st Patoman Elementary School. He was Graduated in 2006 and continued his study in 2nd Rogojampi Junior High School. In 2009, he was graduated and continued his study in 1st Giri Senior High School. And he was graduated and continued his study at University of Brawijaya at Malang until now. His hobby such us : playing piano, and playing games at free time, listening music, and football. Ever dreamed to become a pilot when he was child. His motto is Be the best that you can do.

His name is Wisu Edy Putra Utama.He was born on Januari, 30th 1994 in Sosa, Padang Lawas, Sumatera Utara. he was the first child of Edy Sapto and Dewi Sugiartini. He started school at pasar ujung batu elementary School since 2000 to 2006 and continued tu 1st Sosa junior high school since 2006 to 2009 and continued to 6th PadangSidimpuan high school. And now, he study at University of Brawijaya. My hobby is : playing game, football, and anything as it makes my happy. My moto is Life is simple when we live with heart.

You might also like