falojuice.blogg.se

How to create a software wrapper for trojan
How to create a software wrapper for trojan











how to create a software wrapper for trojan

Technically defined, a Trojan horse is “a malicious and security-breaking program which is designed as something benign”. But actually the file is built of two applications which one of them is the harmless application, and the other one is the Trojan file.

how to create a software wrapper for trojan

This application can be a flash card, flash game, a patch for OS, or even an antivirus. Sometimes the Trojan is combined with another application.

how to create a software wrapper for trojan

The main characteristic of a Trojan is that first it should be executed by the user, second sends or receive data with another system which is the attacker’s system. The Trojans are most of the time defaced and shown as a legitimate and harmless application to encourage the user to execute them. This port can be even a well-known port such as 80 or an out of regular ports like 7777. Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system.













How to create a software wrapper for trojan