Following the identification of a Trojan, removing the threat may include manual elimination or reinstallation of the OS. Good practices will help with the detection and investigation of unusual activity.
- [Instructor] A Trojan can be very dangerous,…and can control nearly everything on your system.…Trojans get into a system in a number of different ways.…And Trojan developers are always trying to find…a new security hole to exploit.…Alright, so you've identified some unusual…or suspicious activity,…and you're now pretty sure you have a Trojan.…Well the first thing is, once you have identified…you have a Trojan, the next step is to remove the threat,…which will most likely be more difficult…than removing a virus.…
Although a Trojan may have gotten in to your system…as an infected file downloaded from the internet,…or as a payload of some other virus,…a Trojan is different than a virus.…Antivirus is not always able to defend against a Trojan,…or be able to remove a Trojan.…In fact, some Trojans are capable of disabling…antimalware protection.…As a result, a Trojan will most likely have to be manually…removed, or the system must be reinstalled.…
After identifying the system is infected with a Trojan,…remove the file.…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits