What is backdoor?

Backdoor in the software or computer system is usually a widely unannounced port, allowing the administrator to infiltrate the system to find the cause of the error or maintenance. In addition, it also refers to the secret port used by hackers and spies for illegal access.

Backdoor in the software or computer system is usually a widely unannounced port, allowing the administrator to infiltrate the system to find the cause of the error or maintenance. In addition, it also refers to the secret port used by hackers and spies for illegal access.

  1. Distinguish malware, viruses and Trojan horses

What is backdoor? What types of backdoors are there?

  1. First, the backdoor can be a legitimate access point embedded into the system or software, to allow remote administration. This type of backdoor is often not widely reported, used for software and system maintenance. Some admin backdoors are protected by hard username and hardcode and cannot be changed; others can be exchanged.

Usually only the system owner or software owner knows about the existence of a backdoor. These administrative backdoors also create vulnerabilities for strangers to exploit and gain access to the system / data.

What is backdoor? Picture 1What is backdoor? Picture 1
Depending on who goes through the backdoor, the backdoor is dangerous

  1. Another type of backdoor is an attacker who can install it on the victim system. Thus they can come and go as they please, allowing remote system access. Malware installed on a system called Remote Access Trojan (RAT), is used to install malware on your computer or steal data.
  2. The third backdoor became famous since 2013 when the NSA document was leaked by Edward Snowden, revealing that for decades the people in the intelligence industry had partnered with the British Intelligence Agency to force the companies. company must install backdoor on their product, especially putting pressure on those who do coding systems.

These secret backdoors allow intelligence agents to bypass the security layer and silently access the system, taking the data they need.

One of the most controversial backdoors is when the NSA deliberately undermines the NIST SP800-90 Dual Ec Prng encryption algorithm so that the data encoded by this algorithm is easily decompiled by NSA.

See more:

  1. Top 12 most dangerous backdoor in computer history
  2. Detects backdoor on NetSarang's server management software
  3. The new Gazer - the back door targets the ministries and embassies around the world
4.5 ★ | 2 Vote