... memory and infect at later
stages
• Some viruses have trigger events to activate and corrupt systems
• Some viruses have bugs that replicate and perform activities like file
deletion and increasing ...
are not infected
Ethical Hacking and
Countermeasures
Version 6
Mod le IX
Mod
u
le IX
Viruses and Worms
Characteristics of a Virus
Virus resides in the memory and repli...
... Module Objective
This module will familiarize you
• Trojans
y
with:
• Trojans
• Overt & Covert Channels
• Types of Trojans and how Trojan works
• Indications ... Ports
Back Orifice UDP 31337 or 31338
Deep Throat UDP 2140 and 3150
NetBus TCP 12345 and 12346
Wh k l TCP 12361 d 12362 Whack-a-mole TCP 12361 and 12362
NetBus 2 Pro TCP 20034
GirlFriend TCP 21544 ... trojan usi...
... sending you,
say yes and save it to the disk and logout.
Ethical Hacking and Countermeasures v6 Exam 312-50 Certified Ethical Hacker
Hacking Router, Cable Modem and Firewalls
Module XXXV
Page ... the router and its network
• Compromise other routers in the network and possibly
the neighboring networks
• Observe and log both incoming and outgoing traffic
• May avoid firew...