Over the years, hackers have written and modified many programs, all designed to get in and manipulate a system. Lisa reviews Netcat, a network Swiss army knife; MoSucker; and Trojan-Proxy programs.
- [Instructor] Over the years, hackers have written…and modified many programs,…all designed to get in and manipulate a system.…Netcat was developed a decade ago,…but even then had advanced functionality,…allowing the hacker to do a wide range of activities.…Some even think of Netcat as a Swiss Army Knife,…as it is a networking utility and exploration tool…that includes a wide variety of features.…
Netcat emulates Trojan Behavior,…as it can create almost any kind of connection necessary,…and has several robust capabilities.…In addition, it can act as a client as well as a server,…which promotes this tool to a whole new level.…Some of Netcat's features include reconnaissance,…by using port scanning to check for open ports,…and banner grabbing to determine…what operating system is running.…Netcat can act as a honeypot, which is a decoy system…used to attract attackers away from valid system resources,…and also acts as a tool to study an attacker's methods.…
Netcat can also be used to chat with different systems,…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits