Backdoor
¨Software that allows an attacker to access a machine using an alternative entry method
¨Installed by attackers after a machine has been compromised
¨May Permit attacker to access a computer without needing to provide account names and passwords
¨Used in movie “War Games”
¨Can be sshd listening to a port other than 22
¨Can be setup using Netcat