Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Re: Help put a stop to incompetent computer forensics
From: Erik Kamerling <ekamerling () snaplen com>
Date: Wed, 10 Aug 2005 18:57:14 -0400

Trojan Horse
A computer program that appears to have a useful function, but also has a 
hidden and potentially malicious function that evades security mechanisms, 
sometimes by exploiting legitimate authorizations of a system entity that 
invokes the program.

Copied from the SANS Glossary of Terms Used in Security and Intrusion 
Detection. 

http://www.sans.org/resources/glossary.php

Best

Erik Kamerling

On Wednesday 10 August 2005 18:43, Jason Coombs wrote:

I'll do some more work on this and see where it leads. The proposal of
"backdoor" as the better term just doesn't work, since a backdoor is a
hidden mechanism for gaining entry or control of a system that is built
into the system by its creator or some other involved party. An intruder
may open up a backdoor in a system by altering its programming rather
than by planting a Trojan, so there needs to be a distinction between
the two.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]