![]() ![]() Record screenshots, audio and video of victim´s PC Use victim´s PC as a botnet to perform DDoS attacks Steal information such as passwords, security codes, credit card information using keyloggers When victims try to download an infected file, dropper installs the malicious code first and then the genuine program. Wrapper: Wrapper wraps dropper, malicious code, genuine code into one exe package. Malicious code: This is the code which exploits the system and gives the attacker control over the target. It has 3 partsĭropper: This is the code which installs malicious code into the target. ![]() Behind the original program, it establishes a backdoor connection with the remote attacker. Trojans usually hide behind a genuine code or program or file to avoid getting noted by the user. It usually deletes or replaces operating system critical files, steal data, send notifications to remote attacker, and remotely control the target. Trojans are malicious files which are used by the attacker to create a backdoor without the knowledge of the user. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |