A Trojan horse is any malware that misleads users of its true intent. The trojan developed by me consists of a PowerShell payload, which on execution on the victim system, triggers a reverse shell back to the attacker system’s IP address, giving the attacker full access to the victim system. Trojans are a common form of malware found in today’s society. However, the following trojan holds the power to evade Windows Defender (built-in windows antivirus). This attack can be used for penetration testing and further practices like privilege escalation, reconnaissance, etc. Downloading and executing the v.bat file will automatically download and execute the trojan, i.e., the rs.exe file. The trojan has been obfuscated in such a way that Windows Defender is not able to detect it and hence, allows it to run on the victim machine.
GHRDC
GHRDC
GHRDC
IEM group again bagged the top position in the best private B Schools in Kolkata and also ranked 5th among East Zone ranked by OUTLOOK.
Outlook, 2024
Outlook, 2024
Outlook, 2024
– NEN (National Entrepreneurship Network) E-Week, 2011-2016
– “Just Careers” Magazine, 2011
– The Telegraph, 2009