Section 6.54 Backdoors and Logic Bombs Flashcards
Objectives 2.4 Given a Scenario, analyse indicators of malicious activity
Backdoor
Originally placed in computer programs to bypass the normal security and authentication functions
Most often put into systems by designers and programmers
Remote Access Trojan (RAT) acts just like a backdoor in our modern networks
● Can be placed by a threat actor on your computer to help them maintain persistent access to that system
Not good security practice but was created to so developers could get back in to their system without going through firewalls etc
Easter egg
A hidden feature or novelty within a program that is typically inserted by the software developers as an inside joke
Code often has significant vulnerabilities
Eater egg code is vulnerable in comparison to the rest of of the code
Logic Bombs
Malicious code that’s inserted into a program, and the malicious code will only execute when certain conditions have been met
Jurassic Park: When Dennis the programmer placed a logic bomb of turning off the electrical grid for a short perod of time to grab the dinasour eggs to sell.