Why Do Trojan Horses Use Denial-Of-Service Attacks?

Great Essays
This week’s lab introduces the student to various types of attacks that can be implemented by distributing a Trojan Horse script or by performing a variety of Denial-of-Service attacks (DoS). To begin to understand how these attacks are performed, the student is instilled with the knowledge as well as the use of file-hashes to identify compromised files and also how to generate file-hashes to establish baseline standards, which could benefit a Tripwire type regiment. Then, the lab takes the student through performing the various tasks associated with implementing such attacks by crafting a Trojan horse-like script. Additionally, the student is exposed to various DoS attacks to see how their use affects a computer system. The goal is not only to show how to identify and mitigate these types of attacks, but to also …show more content…
This is because many software purveyors offer file-hashes to help with the identification of modified software, which may contain malicious Trojan horse-like code. File hashing referrers to the act of using message digests and algorithms to generate hash codes that help validate that a downloaded file, or a file on a computer system, to ensure it has not been corrupted, or influenced, in any other way than originally intended. Project 10-1, shows how these file-hashes can be used by having the student download a version of Wireshark from www.wireshark.org. Although, the lab calls for a Windows Vista version of Wireshark to be downloaded, personal preference and necessity, dictated that the source code version to be downloaded instead. Following the instructions provided, the file containing the formatted file-hashes for the Wireshark download (version 2.0.2) was located under the “Verifying Downloads” header on Wireshark’s download web site. This signed file and its contents are shown in Appendix A, figures 1 and

Related Documents

  • Improved Essays

    backup copies. So, the virus remains active and infects newly created files. Nonresident viruses do not infect computer memory and are active for a limited time only. Nonresident virus does not store or execute itself from the computer memory. 4) What is a Trojan horse? What are the various types of Trojan horses? A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch…

    • 1458 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Detection Malware

    • 1657 Words
    • 7 Pages

    engineering is the use psychological tactics to influence individuals to assist their own victimization. The world of mobile devices keeps growing exponentially. Mobile devices, especially smartphones are easily accessible and with internet service they have become essential to people. The use of internet on mobile devices is called Internet of Things (IoT) services and they are monitored through the use of smartphone applications and services. There are thousands of applications or services that smartphones…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Then on top of this already long list of issues hackers are tech savvy and law enforcement officers usually aren’t and if they are, they do not have the skills needed to combat the hackers. When it comes to the lack of resources facing law enforcement it can be summed up into one issue they don’t have the money to back a cyber unit. The fact is that to train and hire new officers to have…

    • 2201 Words
    • 9 Pages
    Great Essays