What is backdoor?
Backdoor in the software or computer system is usually a widely unannounced port, allowing the administrator to infiltrate the system to find the cause of the error or maintenance. In addition, it also refers to the secret port used by hackers and spies for illegal access.
- Distinguish malware, viruses and Trojan horses
What is backdoor? What types of backdoors are there?
- First, the backdoor can be a legitimate access point embedded into the system or software, to allow remote administration. This type of backdoor is often not widely reported, used for software and system maintenance. Some admin backdoors are protected by hard username and hardcode and cannot be changed; others can be exchanged.
Usually only the system owner or software owner knows about the existence of a backdoor. These administrative backdoors also create vulnerabilities for strangers to exploit and gain access to the system / data.
What is backdoor? Picture 1
Depending on who goes through the backdoor, the backdoor is dangerous
- Another type of backdoor is an attacker who can install it on the victim system. Thus they can come and go as they please, allowing remote system access. Malware installed on a system called Remote Access Trojan (RAT), is used to install malware on your computer or steal data.
- The third backdoor became famous since 2013 when the NSA document was leaked by Edward Snowden, revealing that for decades the people in the intelligence industry had partnered with the British Intelligence Agency to force the companies. company must install backdoor on their product, especially putting pressure on those who do coding systems.
These secret backdoors allow intelligence agents to bypass the security layer and silently access the system, taking the data they need.
One of the most controversial backdoors is when the NSA deliberately undermines the NIST SP800-90 Dual Ec Prng encryption algorithm so that the data encoded by this algorithm is easily decompiled by NSA.
See more:
- Top 12 most dangerous backdoor in computer history
- Detects backdoor on NetSarang's server management software
- The new Gazer - the back door targets the ministries and embassies around the world
You should read it
- Top 12 most dangerous backdoor in computer history
- The new Gazer - the back door targets the ministries and embassies around the world
- Learn about Backdoor.Win32.Bredolab.eua malware
- Detects backdoor on NetSarang's server management software
- Hacker 'implements' the backdoor onto Symbian firmware
- 'Backdoor' plugin, WordPress 3.2 RC2 launches
- Alarm of dangerous bot, Trojan infection rate
- Malicious Code EvilGnome attacks Linux systems with many rare tricks
- How many types of malware do you know and how to prevent them?
- 'Terrible' fire sprinkler gun penetrates concrete walls, iron doors
- Information about Gpcode.ak virus
- Detecting dangerous backdoors targeting both Windows, macOS and Linux
May be interested
Select memory card or cloud to save data?
Learn about clock speed: Base Clock and Boost Speed
What is the IMAX format?
Secure WiFi in enterprise environment from basic steps
Viettel 4G data usage is not limited to high speed data
Is your ID card number, insurance book number and salary required to be secure?