Wang Products

News: Placing Backdoors Through Firewalls

I thought I would link everyone to an interesting article I saw published the other day by van Hauser / THC. This article describes possible backdoors through different firewall architectures. However, the material can also be applied to other environments to describe how hackers cover their access to a system.

Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which a) does it's job and b) is not easily detectable. The kind of backdoor needed depends on the firewall architecture used.

The full article can be read by clicking here
Comment by Calle - 23-07-2005

Really good guide. Thanks Alot!

Post a comment

Please use the form below to post your comments on this article. All comments will be reviewed by the admin before being published publically.

Your Name
  Please enter the code from the image below into the code box


Valid XHTML 1.0! Valid CSS!

Wang Products Articles Security News and Articles/FAQs Wang Products Software Guitar MP3 tracks by Wang Links