Which IoT-focused Trojan is a self-propagating botnet that infects devices using default credentials on Telnet ports 23 or 2323?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which IoT-focused Trojan is a self-propagating botnet that infects devices using default credentials on Telnet ports 23 or 2323?

Explanation:
Mirai is an IoT-focused malware that becomes a self-propagating botnet by scanning the internet for devices exposing Telnet on ports 23 or 2323 and trying default credentials from a large list. When it finds a device it can log into, it infects it and this new device joins the botnet. The infected device then helps spread the malware by scanning for more vulnerable devices, creating a chain reaction that grows the botnet. This behavior—automatic propagation through weak or default Telnet credentials on common IoT devices like cameras and routers—is what makes Mirai the right match for this description. Other options don’t fit as a self-spreading botnet tied to default Telnet credentials. A generic term like IoT Trojans is too broad and doesn’t specify the self-propagation mechanism. Trojan Horse construction kits describe tools for building Trojans, not an actual IoT botnet. A wrapper doesn’t capture the autonomous spreading behavior or the Telnet/default-credential infection method.

Mirai is an IoT-focused malware that becomes a self-propagating botnet by scanning the internet for devices exposing Telnet on ports 23 or 2323 and trying default credentials from a large list. When it finds a device it can log into, it infects it and this new device joins the botnet. The infected device then helps spread the malware by scanning for more vulnerable devices, creating a chain reaction that grows the botnet. This behavior—automatic propagation through weak or default Telnet credentials on common IoT devices like cameras and routers—is what makes Mirai the right match for this description.

Other options don’t fit as a self-spreading botnet tied to default Telnet credentials. A generic term like IoT Trojans is too broad and doesn’t specify the self-propagation mechanism. Trojan Horse construction kits describe tools for building Trojans, not an actual IoT botnet. A wrapper doesn’t capture the autonomous spreading behavior or the Telnet/default-credential infection method.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy