Working of a Trojan

  1. When the trojaned system comes online i.e. when the trojaned system is on active connection an attacker can access to that system.
    Hence , it is must that target system is on active connection in order to have access of it .
  2. Access enables attacker to deploy various attacks on the trojaned  target.
    Attacker                    Active connection            Trojaned
    Target.

Leave a Reply

Your email address will not be published. Required fields are marked *