Port No | 911 |
Service Name | BackOrifice |
RFC Doc | 0 |
Protocol | TCP |
Description | This is the Configuration program of the Back Orifice malware. It allows its user, who is usually a hacker, to configure the backdoor program |
Reference Link | ORIFICE |
Attack | Solutions: Back Orifice:If the server portion of this backdoor malware is active on an infected computer connected to the Internet, a remote user with the correct IP address of the infected computer and running the client part of this backdoor malware connects and takes control of it. These combination of programs serve as a set of remote administration utilities and a hacking tool. It compromises network security. A remote user running the client side of this backdoor program can execute the following on an infected computer: Play around with The start button Desktop icons Currently running processes All open windows It also downloads all recorded passwords of an infected computer from startup. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.