![]() Attacker can monitor user, access information, alter files, etc.RAT includes a back door to maintain the access and control over the victim.RAT allows the atacker to get remote desktop access to the victim's computer.Attacker use this to hide the actual source of the attack.Proxy Server Trojans turns the compromised system into a proxy server.Used to launch ditributed attacks, like DDoS, spamming.Botnets conrolled by Command and Controll Center.Botnet is a large scale of compromised system, they spread over the world.HTTP/HTTPS Trojans create a http/https tunnel to communicate. ![]() ![]() Defacement Trojans allow attacker to view, edit and extract information, for example User-Styled Custom Application.Command Shell Trojans provide a remote control of command shell (i.e.An attacker is upload the trojan on a server, where it can be downloaded immediately when the victiom clikcs on the link Types of trojans Command Shell Trojans ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |