Backdoor: Difference between revisions
Added archive URLs for 1 citation(s) using CRWCitationBot |
Proprietary was written wrong. Tags: Mobile edit Mobile web edit Visual edit |
||
| Line 8: | Line 8: | ||
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system. | A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system. | ||
''' | '''Proprietary backdoors''' | ||
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes. | A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes. | ||