Quasar Remote Access Trojan feature extraction depending on Ethical Hacking

Main Article Content

Mohanad R. Ibrahim
Karam Thanoon

Abstract

These days, computer Trojans had become in the top of the most dangerous types of malwares threats. There is a lot of remote access tools that have ability to manage and apply many features remotely. Quasar Trojan is one of the most uses for Remote Access Trojan (RAT). The researchers apply Quasar on real environment in lab (ethically and for education purposes) and this paper presents the capabilities of Trojans. This paper will present some of Quasar features by extract most important features also presents how to access remotely by using no-IP address (DUC) with other tools of applying access of internal network ethically.


Article Details

How to Cite
Ibrahim, M. R. ., & Thanoon, K. (2022). Quasar Remote Access Trojan feature extraction depending on Ethical Hacking. Technium: Romanian Journal of Applied Sciences and Technology, 4(1), 58–75. https://doi.org/10.47577/technium.v4i1.5831
Section
Articles

References

Wei Jiang, et al ,( October-December 2019) ,” A Highly Efficient Remote Access Trojan Detection Method”, International Journal of Digital Crime and Forensics.

Azhar Ushmani,( Nov-Dec 2018),” Ethical Hacking Cyber Security”, Western Governor University Salt Lake City, Utah USA, International Journal of Information Technology (IJIT)

Aldy A.Putra ,(April,2019),” Reverse Engineering for Analysis Malware Remote Access Trojan”, Jurnal Edukasi dan Penelitian Informatika(JEPIN).

Jean A. Yaacoub,et al,( March , 2021),” A SURVEY ON ETHICAL HACKING: ISSUES AND CHALLENGES”, American University of Beirut,Electrical and Computer Engineering Department.

Nagham A. Sultan, et al,(2020),” Ethical Hacking Implementation for Lime Worm Ransom ware Detection”, Journal of Physics.

Advaitha A., et al,(June,2019), “Ethical Hacking Tools And Techniques To Preserve Security”,JETIR

Bhavin A Patel, ( January 2016) ,”Role of Ethical Hacking in System”.

Georg Thomas,et al,( October 2018), “Issues of Implied Trust in Ethical Hacking”, ORBIT Journal https://github.com/quasar/Quasar

N.p (Dec. 2018) ,”Certified Ethical Hacker - CEH Certification | EC-Council.” EC-Council.

Sai K.Manoj,et al, (May - Jun 2019),” Conceptual Oriented Analysis on the Modern Tools and Techniques to Enrich Security Vulnerabilities in Ethical Hacking”, International Journal of Computer Science Trends and Technology (IJCST).

Harika Reddy,et al,( June 2018),” Cyber Security and Ethical Hacking”, International Journal for Research in Applied Science & Engineering Technology (IJRASET) .

https://github.com/quasar/Quasar

https://any.run/malware-trends/quasar

Similar Articles

<< < 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.