Which Trojan uses web interfaces and port 80 to gain access and is described as an HTTP tunnel that works in reverse direction?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which Trojan uses web interfaces and port 80 to gain access and is described as an HTTP tunnel that works in reverse direction?

Explanation:
Web-based remote access through an HTTP tunnel is the concept being tested. An HTTP RAT is built to be controlled via a web interface and to communicate over port 80, blending in with normal web traffic. It often uses a reverse HTTP tunnel, meaning the infected machine initiates outbound connections to the attacker’s server and carries commands and results back through those HTTP requests. This outbound-first model helps bypass firewalls that block unsolicited inbound connections, making it a practical way to maintain control while remaining inconspicuous. The web UI provides the control panel for the attacker to manage the compromised host. The other options don’t fit this pattern: ICMP trojans use ICMP channels rather than web traffic; a VNC Trojan relies on the VNC protocol for remote desktop access; HTTP/HTTPS trojans can use web channels but the specific description of a reverse-direction HTTP tunnel with a web interface is characteristic of an HTTP RAT.

Web-based remote access through an HTTP tunnel is the concept being tested. An HTTP RAT is built to be controlled via a web interface and to communicate over port 80, blending in with normal web traffic. It often uses a reverse HTTP tunnel, meaning the infected machine initiates outbound connections to the attacker’s server and carries commands and results back through those HTTP requests. This outbound-first model helps bypass firewalls that block unsolicited inbound connections, making it a practical way to maintain control while remaining inconspicuous. The web UI provides the control panel for the attacker to manage the compromised host. The other options don’t fit this pattern: ICMP trojans use ICMP channels rather than web traffic; a VNC Trojan relies on the VNC protocol for remote desktop access; HTTP/HTTPS trojans can use web channels but the specific description of a reverse-direction HTTP tunnel with a web interface is characteristic of an HTTP RAT.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy