Skip to Content
Malware: Fighting Malicious Code
book

Malware: Fighting Malicious Code

by Ed Skoudis, Lenny Zeltser
November 2003
Beginner to intermediate content levelBeginner to intermediate
672 pages
18h 40m
English
Pearson
Content preview from Malware: Fighting Malicious Code

Summary

Backdoors are programs that allow attackers to gain access to a system, bypassing normal security controls. Backdoors allow the attacker to access a system on the attacker's terms, not the system administrator's. The word backdoor is not synonymous with Trojan horse, although people frequently confuse the terms. Trojan horse programs, which are covered in the next chapter, appear to have some benign or even beneficial purpose.

Backdoors can be used for remote execution of individual commands, to gain a command shell on a target system, or even to control the GUI of a victim machine remotely. Using a backdoor, an attacker attempts to maintain control of a victim machine. Attackers often install backdoors after exploiting a misconfiguration ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Jon Edney, William A. Arbaugh
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

Michael Hale Ligh, Steven Adair, Blake Hartstein, Matthew Richard
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin

Publisher Resources

ISBN: 0131014056Purchase book