¨Create popup dialog boxes
¨Log keystrokes
¨List detailed system information
¨Gather passwords and dump SAM database
¨View, copy, rename, delete, search, or compress any file
on the system
¨Edit, add, or remove any system or program configuration
by changing the registry
¨List, kill, or start any process
¨Packet redirection to any other machine and port
(relay)
¨DOS-based application redirection (allows creation of Netcat backdoor)
¨Multimedia control (allows attacker to view victim’s screen and control keyboard)
¨HTTP file server (for viewing victim’s files via web browser)
¨
¨