- When the trojaned system comes online i.e. when the trojaned system is on active connection an attacker can access to that system.
Hence , it is must that target system is on active connection in order to have access of it . - Access enables attacker to deploy various attacks on the trojaned target.
Attacker Active connection Trojaned
Target.
Please follow and like us:
1 Comment