Figure 10.1  Attacker controls the Application-level Trojan horse backdoor on the victim across the network