Chapter 6. Trojans and Backdoors
This chapter covers the following topics:
Trojans: Trojans are one of the top malware threats today and can be used for anything from spying on a user to controlling their system.
Covert Communication: Any means of sending information in some way that is not usually allowed.
Keystroke Logging and Spyware: Keyloggers can be both hardware and software based. Spyware can be used to monitor user activity.
Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.