In order to spread a Trojan, hackers wrap it into a harmless program by using wrappers. Hackers conceal file extensions by taking advantage of the way Unicode represents characters.
- [Instructor] A Trojan uses several methods…to gain access to a system undetected.…The goal is to get in so the Trojan can modify…the system, without throwing any red flags.…Hackers spread Trojans by using anything people find fun…or interesting, such as a free song, app, or game.…The hacker will use social engineering skills…to get the victim to open the Trojan, to get them excited,…or even worried.…For example, sending a victim this message,…might get them to click on a link, and download the Trojan.…
They can also get a Trojan from a peer-to-peer…file exchange, a world wide web or FTP archive,…or by opening an email attachment.…One way to hide, is by wrapping a Trojan…in a seemingly innocent program.…That way, the user will be more prone to download…and install the program.…When wrapped, the hacker conceals the true function,…which is the malware payload.…A wrapper attaches, or wraps an executable,…such as a game or utility, to the Trojan in a single file.…
When the victim installs the executable, it will unpack…
Join cybersecurity expert Lisa Bock in this course as she explains how to identify vulnerabilities in your system, and how to then take countermeasures to prevent unwanted access. Lisa explains how hackers can use a Trojan to penetrate a network and lists the methods and tools that they use. She follows up by sharing how you can perform ethical hacking of your own system to detect areas of susceptibility, so you can address the flaws and defend against attacks. She also discusses rootkits, SSDP amplification attacks, ICMP, and more.
Note: Learning about ethical hacking for Trojans and backdoors is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Identifying and removing Trojans
- Defending against Trojans
- Blended threats
- SSDP amplification attack
- Disguising FTP, HTTP, and ping
- Using ICMP
- Detecting, removing, and avoiding rootkits