¨Software that allows an attacker to
access a machine using an alternative entry method
¨Installed by attackers after a
machine has been compromised
¨May Permit attacker to access a
computer without needing to provide account names and
passwords
¨Used in movie “War Games”
¨Can
be sshd listening to a port other than 22
¨Can be setup using Netcat