Port No | 44575 |
Service Name | Exploiter |
RFC Doc | 0 |
Protocol | TCP |
Description | specific set of actions. This usually works toward the goal of allowing the trojan to survive on a system and open up a backdoor. |
Reference Link | More Information |
Attack | Name:Exploiter A Trojan is a program that enables an attacker to get nearly complete control over an infected PC. Frequently used by as a tool by malicious hackers. When this program executes, the program performs a specific set of actions. This usually works toward the goal of allowing the trojan to survive on a system and open up a backdoor. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.