Backdoor: Difference between revisions
init |
how it works |
||
Line 2: | Line 2: | ||
==How it works== | ==How it works== | ||
There are many types of backdoor. | |||
'''Backdoor malware''' | |||
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it. This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system. | |||
'''Propriatary backdoors''' | |||
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there. These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes. | |||
==Why it is a problem== | ==Why it is a problem== | ||
Line 9: | Line 17: | ||
==Examples== | ==Examples== | ||
* [[SecuRam installs backdoor on ProLogic series safe locks]]. | *[[SecuRam installs backdoor on ProLogic series safe locks]]. | ||
==References== | ==References== |