Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Osploit - A Privacy Invader RAT for Cyber Threat Intelligence  
  Authors : Md. Amdadul Bari; Sharaban Tahura Nisa; AKM Bahalul Haque
  Cite as:

 

Computer technology in today's world is advancing briskly. Everyone surrounding us is leaning on the internet. In the globe of the Internet where it is a form of knowledge, entertainment, the medium of communication, a place of work; and also, on the other hand, it has become harmful and pitfall place. People around the world are getting trapped by the hackers, framed by predators in our day to day life. Cyber-crime is increasing on enormously these days. To prevent cyber-crime throughout the country we developed a spying software called Osploit which is a trojan horse. Trojan is a type of malicious code or software that looks legitimate but can take control of one's computer. Trojan is designed to spy on the victim's computer, access files or to extract sensitive data. The trojan can be used for both good and bad purpose. Osploit Trojan is beneficial for law enforcement intelligence, child monitoring, employee monitoring so on. Trojan is used for unethical activities such as hacking, bank robbery, and stealing personal data.

 

Published In : IJCSN Journal Volume 7, Issue 6

Date of Publication : December 2018

Pages : 344-348

Figures :04

Tables : --

 

Md. Amdadul Bari : Student of Department of ECE, North South University Bashundhara, Dhaka-1229, Bangladesh.

Sharaban Tahura Nisa : Student of Department of ECE, North South University Bashundhara, Dhaka-1229, Bangladesh.

AKM Bahalul Haque : Lecturer of Department of ECE, North South University Bashundhara, Dhaka-1229, Bangladesh.

 

Trojan, Spying Software, Monitoring tool, Cyber Crime, Attack

Every year several successful cyber-attacks and countless attempts are taking place. In the expanding world of Internet, we need to be alert and protected from cybercriminals. We cannot always protect ourselves from evil people of the cyber world. However, if we get trapped, Osploit Trojan can easily track the vile or the hacker instantly. Osploit Trojan is a fruitful software for law enforcement agencies for tracking down criminals.

[1] What is a Trojan? Is it a virus or is it malware? https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html [2] What is a Trojan Virus? | How to Prevent Trojan Horse Virus Attacks https://enterprise.comodo.com/what-is-a-trojan-virus.php [3] IT threat evolution Q2 2018. Statistics https://securelist.com/it-threat-evolution-q2-2018-statistics/87170/?fbclid=IwAR0aKeuBDlJf67Vsm8vCFmI-HF8Cl937SIoI1oq_fr5y6Hm8WdsOUKfR8_w. [4] How Online Fraud Alerts Work https://computer.howstuffworks.com/how-online-fraud-alerts-work1.htm [5] MQTT http://mqtt.org/ [6] A Comparison Between Spring and Spring Boot | Baeldung https://www.baeldung.com/spring-vs-spring-boot [7] Major Advantages of Using MySQL https://www.datamation.com/storage/8-major- [8] advantages-of-using-mysql.html [9] Child Monitoring https://www.bbc.com/news/technology-30930512?fbclid=IwAR0DSOnbpRA15GEoJ8UvwUUEabv1ugIBCn47Bztjir6CLqtE6w1--OKyBw8. [10] Child Monitoring https://www.bbc.com/news/technology-30930512?fbclid=IwAR0DSOnbpRA15GEoJ8UvwUUEabv1ugIBCn47Bztjir6CLqtE6w1--OKyBw. [11] Virus total.com https://www.virustotal.com/?fbclid=IwAR1TqsY4aa99zYJKj01lrxQz68StnJKIx_pwyWoXK8HKJmKdtBWxllN-kas#/home/upload