10BUILDING TROJANS
Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.
–Phaedrus
Consider the following scenario: an attacker, pretending to be the head of IT, sends an email to an employee. The email tells the victim to download the updated version of the Alpine email client. But, unbeknownst to the victim, the attacker has embedded an implant in the program. When the victim installs the client, the installer will install the implant, too.
All ethical hackers should understand the mechanisms of implants like these. Implants concealed within legitimate files ...
Get Ethical Hacking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.