Application-level
Trojan Horse Backdoor
¨User must be tricked into installing this application which gives attacker backdoor access and complete control over victim’s machine
¨List of Application-level Trojan horse backdoor tools and  default ports used http://www.simovits.com/nyheter9902.html
¨Sub7 http://subseven.slak.org
¨Back Orifice 2000 http://www.bo2k.com
¨Hack-a-tack http://www.crokket.ce/hatboard/cgi-bin/pinboard.pl
¨VNC www.uk.research.att.com/vnc