O'Reilly logo

Certified Ethical Hacker Exam Prep by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6Trojans and Backdoors

This Chapter helps you prepare for the EC-Council Certified Ethical Hacker (CEH) Exam by covering the following EC-Council objectives:

Define Trojan horse types

Image Trojan horse programs can be designed for any number of activities, such as remote control, covert communication, or destructive activity. If you can define them and how they work, you can prevent them from doing damage.

Explain the goal of a Trojan

Image Trojan programs are designed to trick the user into executing what might appear to be a legitimate program ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required