Join Lisa Bock for an in-depth discussion in this video Next steps, part of Ethical Hacking: Trojans and Backdoors.
- [Instructor] Thank you for watching…Ethical Hacking: Trojans and Back Doors.…I've reviewed Trojan behavior,…and discussed how to wrap…and conceal Trojans and infect a system.…In addition, I discussed using Trojans in a blended threat…which is a combination of attacks,…and how to recognize if your system…has been infected with a Trojan.…I've discussed getting into a system using various tools,…Trojan proxies and protocols, such as FTP, HTTP,…and even ping to covertly tunnel into an organization.…
I then turned my attention to rootkits,…discussed some common behavior,…and reviewed ways to detect activity…by checking file integrity using a hash value,…and ways to remove and avoid rootkits.…I then continued with a discussion on Trojan forensics,…with a closer examination of a Trojan bot using Wireshark.…I wrapped up with how to detect Trojans,…identify active processes using netstat,…Task Manager and TCPView,…and how to remove and defend against Trojans.…
This course is part of the Ethical Hacking series.…If you're interested in learning more,…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits