Summary

After an attacker successfully compromises a system, to preserve access so he can get back in, he creates backdoors on the system. This enables him to quickly acquire access to any system that he previously compromised. As we covered in this chapter, there are basic listening agent backdoors, in which an attacker just opens a port on a victim’s machine. Trojans are a way to embed a backdoor in an innocent-looking program with the goal of having a victim run it, which in turn will call the covert program and create a backdoor on the given host. Rootkits are a version of backdoors that create Trojan files out of standard system programs. We also covered remote control backdoor programs for NT operating systems.

As you can see, it is critical ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.