Backdoor: Difference between revisions

Plankton (talk | contribs)
init
 
Plankton (talk | contribs)
m changed category to self
 
(2 intermediate revisions by the same user not shown)
Line 2: Line 2:


==How it works==
==How it works==
{{Ph-T-HIW}}
There are many types of backdoor.
 
'''Backdoor malware'''
 
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system.
 
'''Propriatary backdoors'''
 
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes.


==Why it is a problem==
==Why it is a problem==
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref>{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref>
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref>


==Examples==
==Examples==


* [[SecuRam installs backdoor on ProLogic series safe locks]].
*[[SecuRam installs backdoor on ProLogic series safe locks]].


==References==
==References==
{{reflist}}
{{reflist}}


[[Category:Common terms]]
[[Category:Backdoor]]