|
||
AntiOnline Spotlight: Trojan Force
![]() Most hackers (and crackers) take pride in their intimate knowledge of software and systems. To most, the mere notion that they would employ trojans, backdoors or most software "aids" to gain access to remote systems is an affront to their talents and skill sets. Still, trojans are being used to allow attackers free reign on networks and leach valuable data from PCs and servers. "True" hackers may not be using them, but someone is. The debate, however, bears little relevance to administrators. Whether it's hackers, crackers or the oft-maligned script kiddies, administrators owe it to themselves and the safety of their networks to know what these tools are capable of and how to keep an eye out for them. Don't let your network succumb to the whims of outsiders! See what AO members have to say about trojans.
Note: The opinions expressed below are solely those of the individual posters on the AntiOnline forums. This week's spotlight threads: alaedin wonders if hacks are possible without the use of trojans... Can a hacker hack a PC without putting a Trojan in it?Actually, yes. But an understanding of trojans, and what hackers and security folks think of them, is a good conversation starter. i2c tells the group: Trojans are just tools so the "hacker" (I prefer the term cracker) doesn't have to get to involved with low-level stuff. Take, for example, sub7 (sends shivers down my spine even thinking of the l33t people that use it... muuhahaha!); you can delete, add and copy of files. Then there are other features such as remote desktop stuff. It's basically a nasty RAT (remote admin tool).Sgear17 elaborates... Trojan users are referred to as crackers or script kiddies, lamers, etc., which use downloadable software on the 'net that may aid them. A real hacker doesn't use trojans, but uses knowledge to bypass the computer. They think like computer and go inside the computer with the use of vulnerabilities.catch has the following to say: Most attackers use root kits to carry out their objectives.A pen tester, in case you don't already know, refers to a penetration tester. Are attackers pouring into your systems via those nasty trojans? Join this discussion by clicking here.
What is AntiOnline? AntiOnline (AO) is home to many of the most popular network security discussion forums online. Here, participants engage in candid, thought-provoking and enlightening exchanges on the latest hazards and how to protect your systems against them. We invite you to join the AO community (it's free!), share your wisdom and learn a few things in the process.
|
||
|