Figure 10.1
Attacker controls the Application-level Trojan
horse backdoor on the victim across the network