leapfrog attack

leapfrog attack

Use of userid and password information obtained illicitly fromone host (e.g. downloading a file of account IDs andpasswords, tapping TELNET, etc.) to compromise another host.Also, the act of TELNETting through one or more hosts in orderto confuse a trace (a standard cracker procedure).