Trojans continue to evolve and have significantly advanced in their complexity, methods of infection, and payload. Trojan categories include destructive, banking, and remote-access Trojans. Discover how Trojans can use common protocols such as FTP, HTTP,
- [Instructor] We know that there are…many different types of Trojans.…Destructive Trojans, banking Trojans, remote access Trojans…software security disablers, and many others.…But Trojans can also use common protocols…to avoid detection.…An FTP Trojan is an old school Trojan…designed to open port 21 on the infected computer,…so the victim can act like an FTP server,…and listen to a request.…
Normally, FTP is not active on a system.…We'd have to go to programs and features,…and then once open, turn Windows features on or off.…Once in, we'd have to drill down…to Internet Information Services,…and there check FTP server.…After the FTP server is activated,…anyone can gain access to the system using FTP.…
Once in the system, a second port is opened…to send and receive files.…A more advanced version of this Trojan…requires a password that only the hacker knows.…HTTP remote access tool is a web-server…that allows the hacker to browse the victim's computer,…using any browser on any operating system.…The Trojan uses the HTTP protocol…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits