

Note: (How many times have you double clicked on a file someone has sent you and it apparently did nothing)Īt this point what has happened is the server has now been installed on your system. When you then double click on the file, the result is nothing.

The hacker would claim the file to be a game of some sort. Send the server file (for explanation purposes we'll call the file netbusserver.exe) to you via E-Mail.
#Netbus trojan horse file name install#
Objective: Getting the potential victim to install the server onto his/her system. The server is the file that would have to get installed on your system in order to have your system compromised. The Netbus Trojan has two parts to it as almost all Trojans do. Let's take a closer look at a couple of more popular Trojans: * Ability to use your computer as a bridge to do other hacking related activities.
#Netbus trojan horse file name full#
* Full Access to all your drives and files * Record your key strokes and send them to the "Hacker" Some common features with Trojans are as follows: Trojans are small programs that effectively give "hackers" remote control over your entire Computer. In our studies we have found that Trojans are primarily responsible for almost all Windows Based machines being compromised.įor those of you who do not know what Trojans are we ll briefly explain. We all know the story of the Trojan horse probably the greatest strategic move ever made. Trojans are being released by the hundreds every week, each more cleverly designed that the other. Trojan's are probably the most compromising of all types of attacks.

We found it necessary to devote a chapter to Trojans.
