![]() In that case, if there's any method to hide from netstat, it will be hidden from TCPView of course. ![]() I'm not sure if TCPView is just a graphic interface using the netstat program. Many websites recommend using TCPView to check for unusual connections, and I wonder if a Trojan can hide its activity from TCPView. ![]() I guess is less frequently because (I expect) any non-compromised antivirus protect and alert for changes in system files (not sure if I'm being naive).Įven though, If the Trojan uses a Windows process (not it's own name) to connect to the Internet, many times you can identify what isn't an expected connection to some random IP address. Also, less frequently, it can hide its activity from the netstat command (mostly replacing the program with their own version). I know that a Trojan horse can hide from the Windows Task Manager through various methods. I've done a little research before asking, but I still can't find the answer for this. Can a Trojan horse hide its activity from TCPView?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |