Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

The lifecycle of a trojan horse

by Shanmuga| Tweet This | Google +1 | Facebook | Stumble It | Reddit | Digg | del.icio.us

carrumba over at Megapanzer gives a good overview of the lifecycle of a trojan horse, he writes "What a trojan horse needs first are its configuration settings. The information it knows what to do once it is executed on the target system. At this point we have to know the trojan horse is divided into two different parts: the client and the server. The server is the part that is installed on the victims systems, the client is the controlling component on at the attackers side.

The names server and client in this context are a little confusing because normally a client is the one that connects to a server and sends commands to it. This is the way the setup was in use some years ago. The attackers on the client machines connected to the servers on the infected victim machines. But nowadays it works exactly the opposite. The infected victim systems establish a reverse connection to the controlling master system." – Content courtesy of Megapanzer » Blog Archive » The lifecycle of a trojan horse

You may also like to read



{ 1 comment… read it below or add one }

carrumba March 23, 2009 at 6:59 PM

hi there

thanks for putting the article on your page. further reading of that subject will follow …

carrumba

Reply

Leave a Comment

Previous post:

Next post: