cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
442
Views
0
Helpful
1
Replies

Trojen and Session?

alsayed
Level 1
Level 1

Hi

i have to know how the Trojen move between PCs?is there via sharefolders or or unitiate a TCP Session(if via a tcp seesion how can i know?),how can i know about these Things any

1 Reply 1

umedryk
Level 5
Level 5

When the Trojan attachment is opened, it downloads a copy of the email worm component. The email component is encrypted. It drops and installs wincom32.sys, which loads and infects a dll into the memory process of services.exe. The dll contains the capability to scan various UDP ports to create a peer-to-peer (P2P) network with other infected computers for the purpose of downloading and updating. The P2P network can then be used by a malicious user to retrieve information on what files to download and execute. It also retrieves information of additional peers and updates its own peer list file with the gathered information

Review Cisco Networking for a $25 gift card