You are here: irt.org | FOLDOC | leapfrog attack
Use of userid and password information obtained illicitly from one host (e.g. downloading a file of account IDs and passwords, tapping TELNET, etc.) to compromise another host. Also, the act of TELNETting through one or more hosts in order to confuse a trace (a standard cracker procedure).
Nearby terms: leaky heap « Lean « LEAP « leapfrog attack » leap second » learning curve » leased line
FOLDOC, Topics, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z, ?, ALL