Malware
>Different types of malwares sorted by layers

<aside>
👉 Kernel Mode Rootkit Techniques
</aside>
- We're modifying the kernel itself and making the kernel lie to any of the programs that we run.
Application Level Backdoors
>What is it?
- It consists of just getting malware on a computer system, taking over that system, and maintaining access to that computer system.
- Example: Bypassing EDR
>Backdoor
- A backdoor is a program that allows an attacker to access a system, bypassing security controls
>Trojan
- A trojan horse is a program that looks all right but is very sinister in reality
- Some backdoors are also trojan horses, their functionality can be combined.
>RAT - Remote Access Trojan (Trojan Horse Backdoor)
- Allows for the complete control of a victim system remotely across the network
- Has a client server architecture
- Example: PoisonIvy, Sub7, VNC etc.
>Scareware