Trojan Horse
What is a Trojan Horse?
A type of malware that disguises itself as legitimate software to deceive users into executing it.
Expanded Explanation
Once a Trojan is installed, it can create backdoors, steal data, or allow remote control. Ethical hackers test systems for resilience against such tactics by simulating delivery methods or behavioral patterns associated with trojans.
Related Terms
Backdoor, Malware, Payload, Remote Access Trojan (RAT), Social Engineering
Want to learn more?
If you’re interested in Trojan Horse, we recommend: Learn Social Engineering From Scratch Course
Check out our Online Ethical Hacking Courses.
✅ Lifetime access to lessons
✅ Learn the Fundamentals
✅ Learn at your own pace
✅ Designed for Beginner Friendly
✅ No programming or hacking experience needed.
✅ Get answers from our Support Team within a maximum of 15 hours.
✅ Unlimited Updates.
✅ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.