An obvious place for a backdoor is in remote management CPUs embedded in the network card.<p><a href="http://www.ssi.gouv.fr/IMG/pdf/csw-trustnetworkcard.pdf" rel="nofollow">http://www.ssi.gouv.fr/IMG/pdf/csw-trustnetworkcard.pdf</a><p>Network cards which support RMCP/IPMI protocol are obvious points of attack. They can reboot machines, download boot images, install a new OS, patch memory, emulate a local console, and control the entire machine. CERT has some warnings:<p><a href="https://www.us-cert.gov/ncas/alerts/TA13-207A" rel="nofollow">https://www.us-cert.gov/ncas/alerts/TA13-207A</a><p>If there's a default password in a network card, that's a backdoor. Here's a list of the default passwords for many common systems:<p><a href="https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi" rel="nofollow">https://community.rapid7.com/community/metasploit/blog/2013/...</a><p>"admin/admin" is popular.<p>The network card stores passwords in non-volatile memory. If anyone in the supply chain gets hold of the network card briefly, they can add a backdoor by plugging the card into a chassis for power, connecting a network cable, and adding a extra user/password of their own using Linux "ipmitool" running on another machine. The card, when delivered to the end user, now has a backdoor installed. If you have any servers you're responsible for, try connecting with IPMI and do a "list" command to see what users are configured. If you find any you didn't put there, big problem.<p>CERT warns that, if you use the same userid/password for multiple machines in your data center, discarded boards contain that password. So discarded boards must be shredded.