Back Orifice

What Does Back Orifice Mean?

Back Orifice (BO) is a remote administration system that allows a user to take full control of a computer remotely running the Microsoft Windows operating system (OS) across a TCP/IP connection, either through a simple console or graphical user interface (GUI).

Advertisements

BO actually gives the remote machine more control over a local area network (LAN) or through the Internet, that it does with the person sitting in front of a computer. The program is quite controversial, as it was developed to demonstrate the lack of security in the Windows 98 OS and has all the potential capabilities needs by hackers, despite having a legitimate purpose, like remote administration.

The name is a play on words of Microsoft’s BackOffice Server software.

Techopedia Explains Back Orifice

BO was developed by American hacker Josh Buchbinder, also known as Sir Dystic, to expose the security capabilities of Windows 98.

The application came in the form of a remote administration system that is remotely installed without user interaction and does not show up in the task manager panel, so it cannot be killed. It restarts itself each time the OS starts. The system’s client side is installed on another computer where the administrator can take control of the remote computer.

BO has the following capabilities:

  • System control: Allows the administrator to remotely log key strokes or lock/reboot the machine. It can get detailed machine information, including access to all drives and passwords saved or cached by the OS or user.
  • File system control: Allows total control of the file system from copying, modifying, locking and deleting to compression and decompression
  • Process control: Spawns or kills processes at will
  • Multimedia and application control: Controls any multimedia device, such as the computer’s webcam or microphone, plays audio/video (A/V) files, take screenshots and more
  • Network control: Functions as an integrated packet sniffer, allowing the monitoring of data, logs and any passwords while redirecting any incoming packet to any port toward any other port or address

Even with a legitimate purpose like remote administration, the server hides itself from the system and can be distributed as the payload of a Trojan horse. Because of this, the antivirus industry categorizes the tool as malware and immediately quarantines the software.

Advertisements

Related Terms

Latest Buzzwords and Jargon Terms

Related Reading

Margaret Rouse

Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical, business audience. Over the past twenty years her explanations have appeared on TechTarget websites and she's been cited as an authority in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine and Discovery Magazine.Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages. If you have a suggestion for a new definition or how to improve a technical explanation, please email Margaret or contact her…