Learn how to identify vulnerabilities in your system and how to then take countermeasures to prevent unwanted access. Join cybersecurity expert Lisa Bock as she discusses the methods and tools hackers use to penetrate a network. She then explains how you can perform ethical hacking of your own system to detect and address susceptible areas.
- [Lisa] The Trojan horse fable tells of a story of how the Greeks tricked the residents of Troy into bringing a large wooden horse into the city walls. Once inside, a group of men came out of the belly of the horse and opened the gates for the rest of the Greek army to enter the city and then destroy the city of Troy. In today's world, a Trojan horse means using a trick that gets someone to download and install malware on a system. Hello, my name is Lisa Bock and I'm a security ambassador.
In this course, I'll cover Trojans and backdoors. I find this topic particularly interesting because of all the threats I've researched, a Trojan horse is one of the more dangerous, as it can remain in your system for a long period, months, even years undetected. I'll review Trojan behavior and discuss how to wrap and conceal Trojans and infect a system. In addition, I'll discuss using Trojans in a blended threat, which is a combination of attacks, and how to recognize if your system has been infected with a Trojan.
I'll discuss getting into a system using various tools, Trojan proxies, and protocols, such as FTP, HTTP, and even ping to covertly tunnel into an organization. I'll then turn my attention to rootkits, discuss some common behavior and types, review ways to detect rootkit activity by checking file integrity using a hash value, and ways to remove and avoid rootkits. Then I'll wrap up with a discussion on Trojan forensics.
We'll discuss how to detect Trojans, identify active processes using Netstat, Task Manager, and TCP View. I'll then review how to remove and defend against Trojans. This course is part of the Ethical Hacking series. Are you ready? Let's get started.
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits