9.3 – Malware Setup, FUD and Avoidance (Part 1)

9.3 – Malware Setup, FUD and Avoidance (Part 1)
There are two types of Trojan attacks used by attackers to control their victims: local connection and remote connection. In local connection, an attacker performs Trojan attack only in a LAN (Local Area Network) and is able to control any system within that network. To do this, he needs to somehow install Trojan client software on the victim machine. He can use either pen drive, CD or DVD to transfer Trojan clients on the victim machine. Now, he is able to control the victim machine anywhere within the local network. In remote connection, an attacker is able to control a…
To access this content, you must subscribe to this General Subscription, or log in if you are a member.

Share this post