Define the term:
Trojan Horse
- A Trojan Horse is a type of malware that disguises itself as legitimate software.
- It tricks users into installing it voluntarily, unlike viruses that spread on their own.
- Once installed, it can steal data, install backdoors, or give unauthorized access to hackers.
- Trojans are often hidden in freeware, email attachments, or pirated software.
- It does not replicate like a worm but is highly dangerous for system control and data theft.
Spyware
- Spyware is a form of malicious software that secretly gathers information from a user's device.
- It tracks browsing history, keystrokes, login credentials, and personal data without the user’s knowledge.
- Spyware often comes bundled with freeware or infected websites.
- It can be used for identity theft, monitoring, or financial fraud.
- Anti-spyware tools and regular scanning help detect and remove it.
Open Port Identification
- Open Port Identification is the process of scanning a system/network to find active and listening ports.
- Hackers use tools like Nmap to identify open ports that can be exploited.
- Each open port may indicate a running service or application on a machine.
- Port scanning helps network administrators close unnecessary ports to improve security.
- Open ports can be entry points for DDoS, malware injection, or unauthorized access.
Banner Check (Banner Grabbing)
- Banner Grabbing is a technique to collect information about a system or service by connecting to open ports.
- The "banner" is the message returned by a service (like a web server or FTP) that often includes:
- Software version
- Operating system
- Service type
- Attackers use banner grabbing to identify vulnerabilities in outdated software.
- Security best practice is to disable or obscure banners to reduce risk exposure.