![]() ![]() These two Trojans install servers that allow unrestricted remote access to certain versions of Microsoft Windows. Some examples of popular backdoor Trojans include Back Oriface and NetBus. When an attacker compromises a system, it is not uncommon for them to replace certain system executables with versions containing Trojans in order to leave backdoors, hide specific information about the environment from administrators, or hide the intrusion itself. A good example of this is the GNU File Transfer Protocol (FTP) server compromise ( ).Ī classic use for Trojans is with rootkits. Because Trojans mask themselves as legitimate software, they are not easy to detect. Users who cannot verify the source of the software then become victims. An attacker may compromise a vendor's Web site and plant Trojan copies of its software. A Trojan can be sent in an e-mail disguised as an attractive piece of software, or, ironically, as a security update. There are many vectors for Trojan software. Trojan software is software that looks legitimate, but is actually used as a vehicle for conducting malicious activity on a host. In Host Integrity Monitoring Using Osiris and Samhain, 2005 Trojans ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |