ImmuniWeb® by High-Tech Bridge


High-Tech Bridge Newsletter

Subscribe to our newsletter and receive some or all of our corporate news, invitations to security events or HTB Security Advisories – you choose what you want to receive.

Client-side threats - Anatomy of Reverse Trojan attacks

December 2, 2010

Author: Frédéric BOURLA, Head of Ethical Hacking Department at High-Tech Bridge SA


Client-side vulnerabilities are among the biggest threats facing users. Attackers are going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients to install malicious software, often Trojan horses and rootkits. This document explains in detail these threats while how to prevent them.


PDF: Client-side threats - Anatomy of Reverse Trojan attacks (2,3 MB)
Demo Video 1: Client-side threats - Anatomy of Reverse Trojan attacks
Demo Video 2: Client-side threats - Anatomy of Reverse Trojan attacks (part 1)
Demo Video 2: Client-side threats - Anatomy of Reverse Trojan attacks (part 2)
Demo Video 2: Client-side threats - Anatomy of Reverse Trojan attacks (part 3)
Demo Video 3: Client-side threats - Anatomy of Reverse Trojan attacks (part 1)
Demo Video 3: Client-side threats - Anatomy of Reverse Trojan attacks (part 2)