Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Recap
-
Trojans are malicious pieces of code that carry cracker software to a target system
-
Trojans are used primarily to gain and retain access on the target system
-
Trojans often reside deep in the system and make registry changes that allow it to meet its purpose as a remote administration tool
-
Popular Trojans include back orifice, NetBus, SubSeven, beast etc.
-
Awareness and preventive measures are the best defense against Trojans.