Hackers seek to do whatever it takes to get malware in your system. A blended threat is complex and involves various coordinated methods designed to launch a multilayered security exploit that is hard to detect and difficult to contain.
- [Instructor] Modern malware is crafty,…and hackers seek to do whatever it takes…to get malware into your system.…A blended threat is complex, in that it involves…various coordinated methods designed to launch…a multi-layered security exploit…that is hard to detect and difficult to contain.…Blended threats combine a virus, worm,…and Trojan all in one, all with the goal of making money.…An example of a blended threat is using a Trojan…to deliver malware to launch a distributed…denial service attack within an organization.…
A DDoS is an effective attack that uses a botnet.…The botnet is created by infecting thousands of systems…with a virus or Trojan so that…they become a part of a botnet.…The compromised systems are called zombies…that are under control by the botmaster.…The botnet can bring down a website,…but it can also launch an amplification attack,…a type of DDoS attack, which can…clog up a network and consume bandwidth.…
Amplification based attacks are not a new concept.…It's roots are with the Smurf attacks of the mid 1990s…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits