Brain Dump

Trojan Horse

Tags
exploit

Malware that [see page 4, masquerades] as a friendly program, behaving as expected, but also performing some unexpected actions in the background.

The danger of Trojans is that their commonly [see page 5, executed] with the same permission as the user that invokes them... meaning an admin running a Trojan can give admin access to the Trojan.

Counter-protection

You can [see page 6, protect] against Trojan's by:

  • Scrutinising the program code and verify it has no Trojan behaviour.
  • Assume that Trojan horses are inevitable and try to limit the damage they can cause with TCB.