Application-level
Trojan Horse Backdoor
¨
User must be tricked into installing this
application which gives attacker backdoor access
and complete control over victim’s machine
¨
List of Application-level Trojan horse backdoor
tools and
default ports used
http://www.simovits.com/nyheter9902.html
¨
Sub7
http://subseven.slak.org
¨
Back Orifice 2000
http://www.bo2k.com
¨
Hack-a-tack
http://www.crokket.ce/hatboard/cgi-
bin/pinboard.pl
¨
VNC
www.uk.research.att.com/vnc