Back to Search Start Over

Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.

Authors :
Ibrahim, Mohanad R.
Thanoon, Karam H.
Source :
Technium; 2022, Vol. 4 Issue 1, p68-75, 8p
Publication Year :
2022

Abstract

These days, computer Trojans had become in the top of the most dangerous types of malwares threats. There is a lot of remote access tools that have ability to manage and apply many features remotely. Quasar Trojan is one of the most uses for Remote Access Trojan (RAT). The researchers apply Quasar on real environment in lab (ethically and for education purposes) and this paper presents the capabilities of Trojans. This paper will present some of Quasar features by extract most important features also presents how to access remotely by using no-IP address (DUC) with other tools of applying access of internal network ethically. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
2668778X
Volume :
4
Issue :
1
Database :
Complementary Index
Journal :
Technium
Publication Type :
Academic Journal
Accession number :
155574362