Trojans and Other Attacks

In this chapter you will learn about

• Defining Trojans and their purpose

• Identifying common Trojan ports

• Identifying Trojan deployment methods

• Identifying Trojan countermeasures

• Defining viruses and worms

• Identifying virus countermeasures

• Describing DoS attacks

• Defining common DoS attack types

• Describing session hijacking and sequence prediction


I love deep sea fishing. I always have. There’s just something about the waves, the blue water, and never knowing what’s on the end of the line until ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.