First page Back Continue Last page Summary Graphic
Methods of Attack
Viruses
Viruses are probably the worst example of a Trojan Horse because they are embedded into an existing program, mainly in the header.
The program header contain the most critical information such as location and size of segments (Text, data, stack).
The header also contains the actual starting and ending addresses of the code.
A virus modifies the header and adds its own header information such as start and end point, into the program's header.