leapfrog attack Use of userid and password information obtained illicitly from one {host} (e.g. {download}ing a file of account IDs and passwords, tapping {TELNET}, etc.) to compromise another host. Also, the act of TELNETting through one or more hosts in order to confuse a trace (a standard {cracker} procedure). [{Jargon File}]