Back to Search
Start Over
Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.
- Source :
- Technium; 2022, Vol. 4 Issue 1, p68-75, 8p
- Publication Year :
- 2022
-
Abstract
- These days, computer Trojans had become in the top of the most dangerous types of malwares threats. There is a lot of remote access tools that have ability to manage and apply many features remotely. Quasar Trojan is one of the most uses for Remote Access Trojan (RAT). The researchers apply Quasar on real environment in lab (ethically and for education purposes) and this paper presents the capabilities of Trojans. This paper will present some of Quasar features by extract most important features also presents how to access remotely by using no-IP address (DUC) with other tools of applying access of internal network ethically. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 2668778X
- Volume :
- 4
- Issue :
- 1
- Database :
- Complementary Index
- Journal :
- Technium
- Publication Type :
- Academic Journal
- Accession number :
- 155574362