Privacy Attacks :-
Here attacker uses various automated tools which are
freely available on the internet. Some of them are as follows:
1) Trojan :- Trojan is a Remote Administration Tool
(RAT) which enable attacker to execute various software and hardware instructions
on the target system.
Most trojans consist of two parts -
a) The Server Part :- It has to be installed on the the victim's computer.
b) The Client Part :-...