Learn how to backdoor existing software and convert it into a custom trojan.