In short, backdoors combine the functionality of most other types of Trojans in one package.
在短期内,后门相结合的功能,大多数其他类型的木马在一个封装中。
System call hijacking is a common technology used by hackers to keep backdoors on the compromised sys-tem.
系统调用劫持是黑客入侵系统后保留后门常用的一项技术。
Rootkit backdoors — often called trojan horses — can typically be divided into two categories: local programs and network services.
Rootkit的后门-通常被称为特洛伊木马-通常可以分为两类:本地节目和网络服务。
When you find a compromised system, simply download the clean binaries, set your PATH environment variable to use them, and start looking for backdoors.
当你发现一个隐患的系统,只要下载二进制文件的清理,设置你的PATH环境变量来使用他们,并开始寻找后门。
EDIT 1: I could do something like generate a new token that would allow a technician to login via a backdoor, but I'd prefer to avoid backdoors if at all possible.
编辑1:我可以做这样的生成一个新的令牌,让技术人员登录通过后门,但我宁愿避免后门,如果在所有可能的。
EDIT 1: I could do something like generate a new token that would allow a technician to login via a backdoor, but I'd prefer to avoid backdoors if at all possible.
编辑1:我可以做这样的生成一个新的令牌,让技术人员登录通过后门,但我宁愿避免后门,如果在所有可能的。
应用推荐