Chapter 6. Trojans and Backdoors

This chapter covers the following topics:

Image Trojans: Trojans are one of the top malware threats today and can be used for anything from spying on a user to controlling their system.

Image Covert Communication: Any means of sending information in some way that is not usually allowed.

Image Keystroke Logging and Spyware: Keyloggers can be both hardware and software based. Spyware can be used to monitor user activity.

Trojan and ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.