A Trojan in a program that gets into a system a number of different ways. Once infected, the symptoms of a Trojan infection vary, and the results will depend on the type of attack and what process the Trojan modifies.
- [Narrator] Hackers create Trojans…for a number of different reasons.…A Trojan can steal information…such as credit card numbers, email addresses,…medical information, or even trade secrets.…In addition, hackers seek to infect a system…so the victim becomes a part of a botnet.…At some point, someone might ask,…"How did my system get a Trojan?"…The victim may have been careless about security protocols…and in some cases even warned…that they should not run the program.…
However, they did, and as a result, became infected.…Trojans get into a system in a number of different ways.…The hacker presents the Trojan as something harmless…and tricks a victim into downloading something:…an email attachment, free software,…browser helper, or even instant messaging.…A Trojan can be installed via physical access…such as using a USB flash drive.…
A Trojan is a program that executes…when the victim launches a file.…In order to do damage, the hacker must trick…the victim into opening the file…and installing the program.…Programs such as Microsoft Office,…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits