Backdoor Attack in Cyber Security: How Hackers Bypass Authentication