User Tools

Site Tools

tactics:trojan-horse

This is an old revision of the document!


Table of Contents

This article is about a penetration method and its associated class of software backdoors. For the wooden horse deployed by the Ancient Greeks during the Trojan War, see Trojan Horse (vehicle).

Trojan Horse

lorem ipsum

h2

lorem ipsum

h3

lorem ipsum

h4

lorem ipsum

h5

lorem ipsum

tactics/trojan-horse.1716155256.txt.gz ยท Last modified: 2024/08/06 05:52 (external edit)

Find this page online at: https://bestpoint.institute/tactics/trojan-horse