As an ethical hacker you are always trying to find new ways that could be used to hack people without there knowledge, one of the most important way to gain a remote access to the victim's machine is using trojans, trojans are normal softwares or files in general contain a malicious app inside of it, when you install the software o click on the file, you don't notice anything weird, the file opens correctly with no issues, but in the background the milicious app is executed and it's providing a door to your system without your permission, trojans are hardly detected because they come bounded with files.
In this video i will demonstrate a new way used a lot by black hat hackers and penetration tester to gain access to victim's machine.
How you can protect your self?
The solutions are not 100% effective but they will protect you from the most of the trojans out there :
1 - Download and install Malwarebytes antivirus ( my favorite antivirus )
2 - Always check if the application you are downloading from the internet has an md5 key, and check for it using any md5 checker app.
3 - Don't open any email attachments from strangers.
4 - Always update the malwarebytes database so you can detect the newest discovered malwares ...
In this video i will demonstrate a new way used a lot by black hat hackers and penetration tester to gain access to victim's machine.
How you can protect your self?
The solutions are not 100% effective but they will protect you from the most of the trojans out there :
1 - Download and install Malwarebytes antivirus ( my favorite antivirus )
2 - Always check if the application you are downloading from the internet has an md5 key, and check for it using any md5 checker app.
3 - Don't open any email attachments from strangers.
4 - Always update the malwarebytes database so you can detect the newest discovered malwares ...
No comments:
Post a Comment