BackOrifice

Ver:

·         Caballo de Troya

BackOrifice

Back Orifice es un programa de control remoto de ordenadores que funciona bajo un servidor y un cliente. Si colocamos el servidor a otro ordenador remoto, es posible desde el cliente, gobernar cualquier función del ordenador remoto, entre los que destaca abrir y cerrar programas, controlar el CD, leer y modificar ficheros o borrar parte del disco duro. Para ello el servidor se autoejecuta y se borra cada vez que el ordenador ajeno se enciende, nuestro cliente escanea el puerto elegido y cuando este esta abierto actúa a través de él, desde un menú repleto de pestañas y opciones de control remoto. El sistema es bueno para controlar un ordenador u ordenadores dentro de nuestra red LAN, aunque dejar este puerta abierta para Windows es toda una amenaza.

http://es.wikipedia.org/wiki/Back_Orifice

(en) BackOrifice

Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software.

Although Back Orifice has legitimate purposes, such as remote administration, there are other factors that make it suited for less benign business. The server can hide itself from cursory looks by users of the system. If wrapped inside a Trojan horse, it can be installed without trouble and used as an attack point or just to spy on or harass the unsuspecting user.

For those and other reasons, the antivirus industry immediately categorized the tool as malware and appended Back Orifice to their quarantine lists. Despite this fact, it was widely used by script kiddies because of its simple UI and ease of installation.

http://en.wikipedia.org/wiki/Back_Orifice

(en) BackOrifice

A Trojan horse that installs itself as a server on a machine, and allows a user with the BackOrifice client to control the host remotely. Hackers often distribute seemingly harmless executables that also install BackOfifice.  Once installed, a hacker can access all files, system passwords, keystrokes, ad other confidential information to further compromise the network.

http://www.qtsnet.com/SecuritySolutions/security_glossary.html

Temas relacionados

Términos