Changes

Jump to: navigation, search

An Overview of IT Security Threats and Attacks

1,347 bytes added, 18:58, 13 February 2008
Back Door Attacks
== Back Door Attacks ==
 
Back Door attacks utilize programs which provide a mechanism for entering a system without going through the usual authentication process. This can either take the form of hidden access points intentionally put into application by the original developers to aid in maintaining and debugging the software (which were then left in when the software was deployed by customers) or a malicious program that is placed on a system via a virus, or other method which opens up the system to unauthorized access.
 
A number of back door programs have been discovered over the years, some which are listed below:
 
* '''Back Orifice''' - This rather distastefully named tool was developed by a group known as the the Cult of the Dead Cow Communications. The primary purpose of Back Orifice is to provide remote access to a server for the purposes of performing administrative tasks.
 
* '''NetBus'' - Similar to Back Orifice, NetBus is also designed to enable remote administrative access to Windows system.
 
* '''Sub7''' - Sub7 is yet another illicit back door program designed to allow unauthorized access to systems.
 
Whilst the installation of any of the above back door programs on a system will have serious implications for security, all these threats can be effectively prevented through the implementation of a comprehensive virus scanning strategy.

Navigation menu