There are many ways to plant a backdoor on a target system. Also many types of backdoors exists and an attacker might choose any one of them as he sees fit. It is quite easy for an attacker to run an application on a remote system. The next step is for the attacker to decide what to do or what to run on the remote system. Some of the common choices are trojans, rootkits and backdoors. Trojans and rootkits are backdoors but often offer a wealth of other options where a simple backdoor might be nothing more than an interactive shell.
Announcement
Collapse
No announcement yet.
System Hacking - Planting a Backdoor
Collapse