Chapter 12. Using Trojans and Backdoor Applications
The only thing necessary for evil to succeed is for good men to do nothing.
—Edmund Burke
Viruses, Trojans, and backdoor applications are a nightmare for anyone working in the information technology (IT) field. A Trend Micro Computer World article estimated that PC viruses cost businesses approximately $55 billion in damages in 2003. Viruses and Trojans such as Chernobyl, I Love You, Melissa, and others wreak havoc on businesses that rely on technology to operate.
This chapter explores the world of Trojans, viruses, and backdoor applications. You will learn about some of the more notorious viruses and about Trojan and backdoor utilities that malicious hackers and penetration testers use. This ...
Get Penetration Testing and Network Defense now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.