You are here: irt.org | FOLDOC | leapfrog attack
Use of userid and password information obtained illicitly from
one host (e.g. downloading a file of account IDs and
passwords, tapping TELNET, etc.) to compromise another host.
Also, the act of TELNETting through one or more hosts in order
to confuse a trace (a standard cracker procedure).
Nearby terms: leaky heap « Lean « LEAP « leapfrog attack » leap second » learning curve » leased line
FOLDOC, Topics, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z, ?, ALL
©2018 Martin Webb