leapfrog attack
Use of userid and password information obtained illicitly from one host (e.g. downloading a file of account IDs and passwords, tapping TELNET, etc.) to compromise another host. Also, the act of TELNETting through one or more hosts in order to confuse a trace (a standard cracker procedure). [Jargon File]Nearby terms:
Lean ♦ LEAP ♦ leapfrog attack ♦ leap second ♦ learning curve ♦ leased line
Try this search on Wikipedia, Wiktionary, Google, OneLook.
Loading