Backdoor: Difference between revisions
how it works |
m changed category to self |
||
(One intermediate revision by the same user not shown) | |||
Line 6: | Line 6: | ||
'''Backdoor malware''' | '''Backdoor malware''' | ||
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it. This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system. | A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system. | ||
'''Propriatary backdoors''' | '''Propriatary backdoors''' | ||
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there. These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes. | A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes. | ||
==Why it is a problem== | ==Why it is a problem== | ||
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref>{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref> | Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref> | ||
==Examples== | ==Examples== | ||
Line 22: | Line 22: | ||
{{reflist}} | {{reflist}} | ||
[[Category: | [[Category:Backdoor]] |
Latest revision as of 03:22, 22 October 2025
A backdoor is a method of covertly bypassing authentication, often in a digital system. A backdoor can be placed intentionally by a party to secretly access the system, or can be the result of a bug or exploit.
How it works
[edit | edit source]There are many types of backdoor.
Backdoor malware
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.[1] This is often referred to as a Trojan. These often use an unpatched exploit to gain access to the system.
Propriatary backdoors
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.[1] These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes.
Why it is a problem
[edit | edit source]Backdoors can be used to inject spyware in order to collect information on users.[1]
Examples
[edit | edit source]References
[edit | edit source]- ↑ 1.0 1.1 1.2 Malwarebytes. "Backdoor computing attakcs".