Which Trojan family uses vulnerable service protocols such as VNC, HTTP/HTTPS, and ICMP to attack the victim's machine?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which Trojan family uses vulnerable service protocols such as VNC, HTTP/HTTPS, and ICMP to attack the victim's machine?

Explanation:
Service Protocol Trojans are defined by their use of standard network service channels to reach, control, or exfiltrate from a victim machine. They exploit vulnerabilities or misconfigurations in commonly exposed services and transport their payloads or commands over those protocols. The example protocols—VNC, HTTP/HTTPS, and ICMP—represent a range of everyday services an attacker can abuse to establish covert communication or remote control. Because this Trojan family centers on leveraging multiple service protocols rather than a single one, it best fits a category that encompasses using vulnerable protocols like these to attack or manage the compromised host. Narrower options that name a single protocol describe specific variants, but they don’t capture the multi-protocol approach described in the question.

Service Protocol Trojans are defined by their use of standard network service channels to reach, control, or exfiltrate from a victim machine. They exploit vulnerabilities or misconfigurations in commonly exposed services and transport their payloads or commands over those protocols. The example protocols—VNC, HTTP/HTTPS, and ICMP—represent a range of everyday services an attacker can abuse to establish covert communication or remote control. Because this Trojan family centers on leveraging multiple service protocols rather than a single one, it best fits a category that encompasses using vulnerable protocols like these to attack or manage the compromised host. Narrower options that name a single protocol describe specific variants, but they don’t capture the multi-protocol approach described in the question.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy