Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Back Orifice 2000
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Controversy == Back Orifice and Back Orifice 2000 are widely regarded as [[malware]], tools intended to be used as a combined [[rootkit]] and [[Backdoor (computing)|backdoor]]. For example, at present many [[antivirus software]] packages identify them as [[trojan horse (computing)|Trojan horses]].<ref>[https://web.archive.org/web/19991021223522/http://symantec.com/press/1999/n990712.html Symantec press release], dated 12 July 1999, accessed 8 August 2006</ref><ref>[http://www.iss.net./prReleases/pr_14513.html ISS press release]{{Dead link|date=June 2019 |bot=InternetArchiveBot |fix-attempted=yes }}, dated 13 July 1999, accessed 8 August 2006</ref><ref>[http://www.trendmicro.com/en/about/news/pr/archive/1999/pr071299.htm Trend Micro press release] {{Webarchive|url=https://web.archive.org/web/20070311035454/http://www.trendmicro.com/en/about/news/pr/archive/1999/pr071299.htm |date=2007-03-11 }}, dated 12 July 1999, accessed 8 August 2006</ref><ref>[http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=1770 CA threat description] {{Webarchive|url=https://web.archive.org/web/20070312000845/http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=1770 |date=2007-03-12 }}, dated 30 November 2005, accessed 8 August 2006</ref><ref>[http://www.f-secure.com/v-descs/bo2k.shtml F-secure threat description], accessed 8 August 2006</ref> This classification is justified by the fact that BO2k can be installed by a Trojan horse, in cases where it is used by an unauthorized user, unbeknownst to the system administrator. There are several reasons for this, including: the association with cDc; the tone of the initial product launch at DEF CON<ref>[http://www.cnn.com/TECH/computing/9907/21/badrap.idg/ CNN.com report "Bad rap for Back Orifice 2000?"], dated 21 Jul 1999, accessed 8 August 2006</ref> (including that the first distribution of BO2k by cDc was infected by the [[CIH (computer virus)|CIH]] virus<ref>[https://web.archive.org/web/20070311051432/http://news.zdnet.com/2100-9595_22-515160.html ZDNet news "Back Orifice CDs infected with CIH virus"], dated 14 July 1999, accessed 8 August 2006</ref>); the existence of tools (such as "Silk Rope"<ref>{{Cite web |url=http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR%5FORIFICE%2EADD |title=Trend Micro threat description |access-date=2020-06-21 |archive-url=https://web.archive.org/web/20021020021916/http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR_ORIFICE.ADD |archive-date=2002-10-20 |url-status=live }}</ref>) designed to add BO2k [[Dropper (malware)|dropper]] capability to self-propagating malware; and the fact that it has actually widely been used for malicious purposes.<ref>[http://seclists.org/incidents/2000/Oct/0010.html Insecure.org mailing list archive], Rik van Riel report dated 3 October 2000, accessed 8 August 2006</ref><ref>[http://www.securityfocus.com/news/11324 Security Focus "Airport PCs stuffed with meaty goodness"], dated 21 September 2005, accessed 8 August 2006</ref><ref>[http://www.microsoft.com/technet/security/alerts/info/inforat.mspx Microsoft Security Administrator article "Danger: Remote Access Trojans"], September 2002 edition, accessed 8 August 2006</ref> The most common criticism is that BO2k installs and operates silently, without warning a logged-on user that remote administration or surveillance is taking place.<ref>[http://www.schneier.com/crypto-gram-9908.html#BackOrifice2000 Bruce Schneier's Crypto-Gram Newsletter], dated 15 August 1999, accessed 8 August 2006</ref> According to the official BO2k documentation, the person running the BO2k server is not supposed to know that it is running on their computer.<ref>{{Cite web |url=http://bo2k.sourceforge.net/docs/bo2k_1_1_5/BasicTutorial.html |title=Official BO2k Documentation: Basic Setup |access-date=2007-05-10 |archive-url=https://archive.today/20120710140604/http://bo2k.sourceforge.net/docs/bo2k_1_1_5/BasicTutorial.html |archive-date=2012-07-10 |url-status=dead }}</ref> BO2k developers counter these concerns in their ''Note on Product Legitimacy and Security'', pointing out—among other things—that some remote administration tools widely recognized as legitimate also have options for silent installation and operation.<ref>{{Cite web |url=http://bo2k.sourceforge.net/docs/bo2k_legitimacy.html |title=Legitimacy |access-date=2006-08-05 |archive-url=https://web.archive.org/web/20050407210233/http://bo2k.sourceforge.net/docs/bo2k_legitimacy.html |archive-date=2005-04-07 |url-status=dead }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)