Buffer Overflow
developer does not validate user input to ensure appropriate size (allow too large input)
During which stage is a Back Door often used?
Development + Debugging
Characteristics of Back Door
undocumented command sequences, allow individuals with back door knowledge to bypass normal restrictions
Time of Check to Time of Use (TOC/TOU)
timing vulnerability = program checks access permission too far in advance of request
Rootkit
freely available on the internet, exploits known vulnerabilities, allows escalation of privilege