How Do Backdoors Get Onto a System?
Generally, backdoors can appear on a system when an attacker does one or more of the following:
Frequently overlooked as sources of backdoor access, user-installed applications that have legitimate purposes can be misused by unauthorized users. As we mentioned at the beginning of this section, not all backdoors are developed or installed by those with malicious intent. Nevertheless, a user who installs VNC on his office computer so that he can access his desktop machine from home creates an inviting target for an attacker, especially if he has not configured a session password. NetCat, a network administration tool, can also become a potential backdoor. With a single command under Windows, its possible to get NetCat to bind a command shell to a port so that incoming telnet sessions on the port receive a DOS prompt as if they were sitting at the local machine. Legitimately installed network diagnostic tools can be quickly turned against the infrastructure by an attacker.
Home - Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.