First page Back Continue Last page Summary Graphic
How to Compromise A Password
Start with a compromised system
Instrument the system by installing a Trojan Horse in programs that require a person to type their password
Modify network programs on the compromised system so that passwords can be sniffed off of the network