To accurately respond to your question, I would need specific details or context from the assigned video you are referring to. However, I can provide a brief overview of the techniques mentioned:
1. **Trojan horse**: This is a type of malware that disguises itself as legitimate software to trick users into installing it.
2. **Penetration test**: This is a method used to evaluate the security of a system by simulating an attack from a malicious