As more and more people regularly use the Internet, cybersecurity is becoming more important for everyone, and yet many people are not aware of it. Hacker is using malware to hack personal information, financial data, and business information by infecting systems with viruses, worms, and Trojan horses. But Internet security is not only about protecting your machine from malware; hackers can also sniff your data, which means that the hackers can listen to your communication with another machine. Other attacks include spoofing, mapping, and hijacking.
Some hackers may take control of your and many other machines to conduct a denial-of-service attack, which makes target computers unavailable for normal business. Against high-profile web servers such as banks and credit card gateways.
You are a security administrator of your company, and your job responsibilities include protecting the network from Trojans and backdoors, Trojan attacks, theft of valuable data from the network, and identity theft.
The objective of this lab is to help students learn to detect Trojan and backdoor attacks. The objectives of the lab include:
Creating a server and testing the network for attack
Detecting Trojans and backdoors
Attacking a network using sample Trojans and documenting all vulnerabilities and flaws detected
Creating a Server Using the ProRat Tool