December 2018
Intermediate to advanced
318 pages
8h 28m
English
Once the initial compromise has been done, a connection to the homing device also known as the command and control server is made. Usually, this stage requires a user to install a Remote-Qaccess Trojan (RAT), which sets up a remote connection to the command and control server or the botnet.
Read now
Unlock full access