Chapter 6Trojans and Backdoors

This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives:

Define Trojan horse types

Image Trojan horse programs can be designed for any number of activities, such as remote control, covert communication, or destructive activity. If you can define them and how they work, you can prevent them from doing damage.

Explain the goal of a Trojan

Image Trojan programs are designed to trick the user into executing what might appear to be a legitimate program ...

Get Certified Ethical Hacker Exam Prep now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.