Đang chuẩn bị liên kết để tải về tài liệu:
Module 08 Trojans and Backdoors

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit. | 1M c EH Certified Ethical Hacker Ethical Hacking and Countermeasures Version 6 Module VIII Trojans and Backdoors TM c EH Scenario Certified Ethical Hacker Zechariah works for an Insurance firm. Though being a top performer for his branch he never got credit from his Manager Ron. Ron was biased to a particular sect of employees. On Ron s birthday all employees including Zechariah greeted him. Zechariah personally went to greet Ron and asked him to check his email as a birthday surprise was awaiting him Zechariah had planned something for Ron. Unknown of Zechariah s evil intention Ron opens the bday.zip file. Ron extracts the contents of the file and runs the bday.exe and enjoys the flash greeting card. Zechariah had Ron infect his own computer by a Remote Control Trojan. What harm can Zechariah do to Ron Is Zechariah s intention justified EC-Council Copyright by Ec-Council All Rights Reserved. Reproduction is Strictly Prohibited TM c E H News Certified Ethical Hacker canada.com WHERE PERSPECTIVES CONNECT l lew Trojan can drain your bank accounts Si leritbanker lurks on various websites Gillian Shaw CanWest News Service Thursday January 1 7 2OOS In what is being billed as one of the most sophisticated cyber attacks to hit the Internet a Trojan Horse program has been issued that gets between computer users and their banking websites giving thieves free rein to drain accounts and wreak financial havoc on their victims. Dubbed the silentbanker it is a Trojan that computer users can unknowingly download onto their computers by simply browsing websites. It operates undetected with the first sign that it is at work the possible notification from a bank that a client has been a victim of fra u d. More than 40 0 banks - including som worldwide by the virus which operates across several countries and in many languages according to Symantec a computer security company that has been tracking the progress of the Trojan. I d have to say it is one of the most sophisticated we have