Worm, Virus & Trojan Horse: Ethical Hacking Tutorial

Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives.

In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. We will also look at the countermeasures that can be used to protect against such activities.

Topics covered in this tutorial

What is a Trojan horse?

A Trojan horse is a program that allows the attack to control the user’s computer from a remote location. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc.

The list below shows some of the activities that the attacker can perform using a Trojan horse.

What is a worm?

 

Learn everything about Trojans, Viruses and Worms

 

A worm is a malicious computer program that replicates itself usually over a computer network. An attacker may use a worm to accomplish the following tasks;

What is a Virus?

           Learn everything about Trojans, Viruses and Worms

Computer viruses have been known to employ social engineering techniques. These techniques involve deceiving the users to open the files which appear to be normal files such as Word or Excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.

Trojans, Viruses, and Worms counter measures

                                         Learn everything about Trojans, Viruses and Worms

Trojan, Virus, and Worm Differential Table

Trojan Virus Worm
Definition Malicious program used to control a victim’s computer from a remote location. Self replicating program that attaches itself to other programs and files Illegitimate programs that replicate themselves usually over the network
Purpose Steal sensitive data, spy on the victim’s computer, etc. Disrupt normal computer usage, corrupt user data, etc. Install backdoors on victim’s computer, slow down the user’s network, etc.
Counter Measures Use of anti-virus software, update patches for operating systems, security policy on usage of the internet and external storage media, etc.

 

gtupapers is Sponsored by Netsparker
Netsparker

Netsparker, the developers of Proof Based Scanning technology, have sponsored the gtupapers project to help raise web application security awareness and allow more developers to learn about writing secure code