Backdoors and Trojan horses
Backdoors and Trojan horses are two very common malware types used to maintain access to the environment. One of the first tasks once access to the environment is established is to ensure the access is kept, and backdoors and Trojan horses are used most of the time to achieve this.
A backdoor is a program or a service that will allow bypassing security controls implemented in the environment – for example, not providing a username or password to get access to a system. On the other hand, Trojan horses are a program or service that looks legitimate and has useful functionality within the system but has hidden functionality. It is named for the historical wooden horse that was used in the Trojan War by the Greeks to enter the city of Troy.
In the previous paragraphs, we talked about backdoors and Trojan horses as separate methods to maintain access. However, both techniques can be used together. When used together, it is called a Trojan horse...