leapfrog attack

Use of userid and password information obtained illicitly from one host (e.g. downloading a file of account IDs and passwords, tapping TELNET, etc.) to compromise another host. Also, the act of TELNETting through one or more hosts in order to confuse a trace (a standard cracker procedure).

[Jargon File]

Try this search on Wikipedia, OneLook, Google

Nearby terms: leaky heap « Lean « LEAP « leapfrog attack » leap second » learning curve » leased line


Loading

Copyright Denis Howe 1985

directoryold.com. General Business Directory. http://hotbookee.com.