Reverse Intent the name given to a common hacker technique of flip-flopping a piece of security knowledge to identify a potential weakness. For example, identifying the version of Bind running on a DNS server is used to identify common exploits of that version of software.
It is also the development and adoption of Information Systems Security policies, which by their wording; unintentionally and inadvertently reveal system vulnerabilities and capabilities that can be exploited by attackers. For example: a policy, which states: “System administrators shall not leave modems attached to the server in ‘auto answer’ or ‘auto response’ condition after normal working hours, during weekends and holidays” indicates they are setup that way during normal business hours. Hackers can use the reverse intent to try and compromise the network.
Related Terms: Reverse Engineering