CEHv8: Certified Ethical Hacker Version 8 by Sean-Philip Oriyano
Author:Sean-Philip Oriyano
Language: eng
Format: epub
ISBN: 9781118989289
Published: 2014-06-23T00:00:00+00:00
Trojan Construction Kits
Much as for viruses and worms, several construction kits are available that allow for the rapid creation and deployment of Trojans. The availability of these kits has made designing and deploying malware easier than ever before:
Trojan construction kit—One of the best examples of a relatively easy to use, but potentially destructive, tool. This kit is command-line based, which may make it a little less accessible to the average person, but it is nonetheless very capable in the right hands. With a little effort, it is possible to build a Trojan that can engage in destructive behavior such as destroying partition tables, master boot records (MBRs), and hard drives.
Senna Spy—Another Trojan-creation kit that provides custom options, such as file transfer, executing DOS commands, keyboard control, and list and control processes.
Stealth tool—A program used not to create Trojans, but to assist them in hiding. In practice, this tool is used to alter the target file by moving bytes, changing headers, splitting files, and combining files.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(14635)
The Mikado Method by Ola Ellnestam Daniel Brolund(11893)
Hello! Python by Anthony Briggs(11808)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11250)
Dependency Injection in .NET by Mark Seemann(11012)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10523)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9845)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9436)
Grails in Action by Glen Smith Peter Ledbrook(9176)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8823)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8611)
The Kubernetes Operator Framework Book by Michael Dame(8471)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8314)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8292)
Robo-Advisor with Python by Aki Ranin(8245)
Practical Computer Architecture with Python and ARM by Alan Clements(8218)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8189)
Building Low Latency Applications with C++ by Sourav Ghosh(8094)