Answer the question
In order to leave comments, you need to log in
How to detect iron backdoor?
Presumably, a backdoor (iron) is installed on the machine, how to detect it? Are there articles on a similar topic?
PS I will be glad to any advice. Please, links to forums, articles, faks, anything. Reviews of the latest developments of special services are also suitable)
Answer the question
In order to leave comments, you need to log in
In the closed parts of thematic exhibitions, we saw these "latest developments" covered with state secrets, I would tell you, but there’s nothing special to tell, everything is as old as the world, but now with guis, taking into account UX \ UI, so that even complete morons would understand, which have their own, well-established methods :-)
Any suspicious hardware, such as a network card, if there is a discrete one, or any other card without a real need for it, and / or the presence of drivers. At one time, "keyboard extension cords" were popular, now there are probably even USB hubs, only this is all from another opera, and nobody needs it for hell.
Now the most common hardware tab, a set of Intel personal belongings for remote administration, but on the one hand it is treated, and on the other hand it is bypassed, but it is also treated:
Did you study German (door in English dɔː or doo)?
You can detect it in two ways: unusual behavior to some instructions (very unlikely), or a response to something that should not respond. Well, or if you intercept the moment when someone breaks into it.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question