Completed
What makes a backdoor good
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Vulnerable by Design - The Backdoor That Came Through the Front
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Who am I
- 3 All bugs are shallow
- 4 Structure
- 5 binaries
- 6 NSA backdoors
- 7 War Games
- 8 What makes a backdoor good
- 9 Historical backdoors
- 10 The creator was like
- 11 How the whole thing worked
- 12 The missing quality
- 13 The Linux kernel backdoor
- 14 The Linux bitkeeper backdoor
- 15 Commit discrepancies
- 16 The backdoor
- 17 Removing one character
- 18 A better backdoor
- 19 Bad programming
- 20 Backdoor
- 21 C99
- 22 R57
- 23 Backdoors
- 24 Source code
- 25 Versions
- 26 Extract Issue
- 27 WDB Backup
- 28 The Real Issue
- 29 The Code
- 30 The Bad
- 31 Perfect backdoor
- 32 Database password
- 33 Why would you do that
- 34 Linux kernel backdoor
- 35 Other good backdoors
- 36 Questions