Back channel or covert channel synonyms

Category:
Part of speech:
Terms used for a computer system compromised in such a way that it opens a channel for a cracker. Typical back channel protocols are X-Windows System and shells such as telnet. Because these programs are often part of a target’s computer system, attacks that cannot otherwise compromise the system can nonetheless trigger a back connection that allows a remote shell. From a system security point of view, it is important to note that a back channel will contact the cracker, who must have a fixed IP Address. It is through this procedure that security sleuths can determine who the cracker is. Terms used for a computer system compromised in such a way that it opens a channel for a cracker. Typical back channel protocols are X-Windows System and shells such as telnet. Because these programs are often part of a target’s computer system, attacks that cannot otherwise compromise the system can nonetheless trigger a back connection that allows a remote shell. From a system security point of view, it is important to note that a back channel will contact the cracker, who must have a fixed IP Address. It is through this procedure that security sleuths can determine who the cracker is. This security sleuth information is known to those in the Computer Underground, so more sophisticated behavior is needed when introducing anonymizers in the back channel on previously compromised machines. Anonymizers are contacted by the back channel; they then forward the communication (maybe with further directions) to the attacker. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
0
0
The numerical sequence that serves as an identifier for an Internet server. An IP address appears as a series of four groups of numbers separated by dots. The first group is a number between 1 and 255 and the other groups are a number between 0 and 255, such as 192.135.174.1. Every server has its own unique address.
0
0
(Intransitive) To cast the shell, or exterior covering; to fall out of the pod or husk.
0
0
(Computing) A network protocol that enables one computer to communicate with another via the Internet; the program that acts as the client in this situation
0
0
Terms used for a computer system compromised in such a way that it opens a channel for a cracker. Typical back channel protocols are X-Windows System and shells such as telnet. Because these programs are often part of a target’s computer system, attacks that cannot otherwise compromise the system can nonetheless trigger a back connection that allows a remote shell. From a system security point of view, it is important to note that a back channel will contact the cracker, who must have a fixed IP Address. It is through this procedure that security sleuths can determine who the cracker is. Terms used for a computer system compromised in such a way that it opens a channel for a cracker. Typical back channel protocols are X-Windows System and shells such as telnet. Because these programs are often part of a target’s computer system, attacks that cannot otherwise compromise the system can nonetheless trigger a back connection that allows a remote shell. From a system security point of view, it is important to note that a back channel will contact the cracker, who must have a fixed IP Address. It is through this procedure that security sleuths can determine who the cracker is. This security sleuth information is known to those in the Computer Underground, so more sophisticated behavior is needed when introducing anonymizers in the back channel on previously compromised machines. Anonymizers are contacted by the back channel; they then forward the communication (maybe with further directions) to the attacker. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.
0
0
Find another word for back channel or covert channel. In this page you can discover 5 synonyms, antonyms, idiomatic expressions, and related words for back channel or covert channel, like: computer underground (cu), ip address, shell, telnet and x-windows system.