Trojan
- Piece of malicious software that is disguised as a piece of harmless or desirable software
- Claims that it will perform some needed or desired function for you
- History:
- Large wooden horse as a gift to the city of Troy
- The soldiers came out from within that wooden horse
- In cybersecurity trojans work similarly
- Example:
- Downloading a pirate copy of the Tetris game, it was infected!
- In order to run the game it plays just as you thought it would but it is also opening a connection from your system to the attacker's.
- Trojans are commonly used today by attackers to exploit a vulnerability in your workstation and then conducting data exfiltration to steal your sensitive documents, creating backdoors to maintain persistence on your systems, and other malicious activities
- Be careful whenever you download and install any programs
Remote Access Trojan (RAT)
- Type of Trojan that is widely used by modern attackers because it provides the attacker with remotecontrol of a victim machine
How easy it is to create a Virus/Trojan?
- Known vulnerable Windows 7 machine was used
- Tool used: JPS Virus Maker
- Tie virus into another system using other techniques like social engineering
- Use ProRat for simulating a Remote Access Trojan (RAT)