Trojans and Backdoors

utilize the items described in the lesson/resources or research conducted on the web to ensure your post contains the following;

Describe how an attacker could use a sniffer in conjunction with a Trojan to successfully gain access to sensitive data.
Describe how the attacker could use the Flaw Hypothesis Methodology to potentially gain a foothold.