attacker sends packets -> packets are dropped by firewall -> packets properties are captured in logs -> backdoor reads logs and finds encoded commands -> commands are executed
As a covert channel? .. no, it's a waste. Once you have the access to set that up, you could establish any number of more efficient schemes.
As a way to do a "remote wake-up" though .. it might have some promise .. but it still depends on too many other variables.
~Mike. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
