Watch this video on YouTube
How can an application backdoor be identified when unauthorized access is suspected in a recently modified web application?