Back door programs are the malicious hackers tool of choice that allows remote connections to systems. A typical back door opens a network port UDP/TCP, on the host when it is executed. Then, the listening back door waits for a remote connection from the attacker and allows the attacker to connect to the system. This is the most common type of back door functionality, which is often mixed with other Trojan like features.
Another kind of back door relates to a program design flaw. Some applications, such as the early implementation of SMTP, which means simple Mail transfer protocol, allowed teachers to run a command for debugging purposes.
NEWS
The Morris Internet worm uses such a command to execute itself remotely, with the command placed as the recipient of the message on such vulnerable installations.
Fortunately, this command was quickly removed once the Morris worm exploited it. However, there can be many applications, especially newer ones, that allow for similar insecure features. This is how the attacker can make mistakes and get caught, but very few do get caught or make these mistakes.
Another type of Trojan or program, would be the password stealing Trojan's. The password stealing Trojans, are a special subclass of Trojans, this class of malicious Trojans can program and be used to capture and send a password to an attacker. As a result, an attacker can return to the vulnerable system and take whatever he or she wants. The password Stealers are often combined with key loggers to capture keystrokes when the password is typed at login.
Bad News For Hackers NEWS
0 comments:
Post a Comment