Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
5Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
CEHv6 Module 08 Trojans and Backdoors

CEHv6 Module 08 Trojans and Backdoors

Ratings: (0)|Views: 1,231 |Likes:
Published by humosapiens

More info:

Published by: humosapiens on Nov 21, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/11/2012

pdf

text

original

 
Ethical Hacking andCountermeasures
Version 6
 oue
Trojans and Backdoors
Scenario
Zechariah works for an Insurance firm. Though being a top, ,Ron.Ron was biased to a particular sect of employees. On Ron’sbirthday all employees including Zechariah greeted him. email as a birthday surprise was awaiting him! Zechariah hadplanned something for Ron.Unknown of Zechariah’sevil intention Ron oens the
bda.zi
file. 
 
Ron extracts the contents of the file andrunsthe
bday.exe
andenjoys the flash greetingcard.Zechariah had Ron infect his own computer by a Remote ControlTrojan.
What harm can Zechariah doto Ron? Is Zechariah’s intention ustiied?
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
 
 
News
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
Source:
http://www.canada.com/ 
Module Objective
This module will familiarize you
 
with:
Overt & Covert ChannelsTypes of Trojans and how Trojan worksIndications of Trojan attack DifferentTrojans used in the wildToolsfor sending TrojanWrappersConstructing a Trojan horse using Construction KitTools for detecting TrojanAnti-Trojans 
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
Avoiing Trojan Infection
 
Module Flow
Introduction to Overt & CovertTypes androansannesorngoa roanIndications of Trojan Attack Different TrojansTools to Send TrojanICMP TunnelingTrojan Construction KitWrappers-
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
 
Introduction
Malicioususers are alwas on the rowl to sneak intonetworks and create troubleTrojan attacks have affected several businesses around theglobeIn most cases, it is the absent-minded user who invitestroubleby downloading files or being careless about securityaspectsThis module covers different Trojans, the way they attack, 
EC-Council
Copyright © by
EC-Council
All Rights Reserved.ReproductionisStrictlyProhibited
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->