Ask hackers and other cybersecurity experts, and they'll tell you that the entire idea of a âoebackdoorâ is a bureaucratic fantasy with little basis in technical reality.
The entire idea of a "backdoor" is fantasy? What the actual fuck are you smoking man.
So...what do you call a command interpreter listening on the port of an unsuspecting user's machine exactly?
How about a modification of hosted files to allow an attacker to bypass authentication on a page in some highly unlikely/impossible set of conditions he/she can emulate?