A
A
Alla_Pugacheva2016-03-24 14:57:28
Iron
Alla_Pugacheva, 2016-03-24 14:57:28

How to detect iron backdoor?

Presumably, a backdoor (iron) is installed on the machine, how to detect it? Are there articles on a similar topic?
PS I will be glad to any advice. Please, links to forums, articles, faks, anything. Reviews of the latest developments of special services are also suitable)

Answer the question

In order to leave comments, you need to log in

3 answer(s)
D
Dmitry Zemskov, 2016-03-24
@SADKO

In the closed parts of thematic exhibitions, we saw these "latest developments" covered with state secrets, I would tell you, but there’s nothing special to tell, everything is as old as the world, but now with guis, taking into account UX \ UI, so that even complete morons would understand, which have their own, well-established methods :-)
Any suspicious hardware, such as a network card, if there is a discrete one, or any other card without a real need for it, and / or the presence of drivers. At one time, "keyboard extension cords" were popular, now there are probably even USB hubs, only this is all from another opera, and nobody needs it for hell.
Now the most common hardware tab, a set of Intel personal belongings for remote administration, but on the one hand it is treated, and on the other hand it is bypassed, but it is also treated:

C
chupasaurus, 2016-03-24
@chupasaurus

Did you study German (door in English dɔː or doo)?
You can detect it in two ways: unusual behavior to some instructions (very unlikely), or a response to something that should not respond. Well, or if you intercept the moment when someone breaks into it.

D
Diman89, 2016-03-24
@Diman89

The iron backdoor will be revealed by a special check, the soft backdoor will be revealed by a special check

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question