Techniques for building a hidden backdoor

SECRET PASSAGE

Article from Issue 77/2007
Author(s):

Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

After launching a successful attack, a malevolent hacker will not just sit back and rest. Exploiting a vulnerability and gaining root privileges is just half the story. As a rule, attackers are more interested in continuing to exploit the machine by launching attacks from it. To make this easier, an attacker will typically try to manipulate the victim machine after gaining initial access.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Honeynet

    Security-conscious admins can use a honeynet to monitor, log, and analyze intrusion techniques.

  • Reverse Shells

    Firewalls block shell access from outside the network. But what if the shell is launched from the inside?

  • News

    In the news: Linux Mint Dropping Blueberry Bluetooth Configuration Tool; Fedora 36 Beta Now Has a Release Date; AV Linux MX-21 Released for All Your Audio/Video Production Needs; Slax Proves You Can't Keep a Good Linux Distribution Down; Dirty Pipe Might Be the Most Severe Vulnerability to Hit Linux in Years; and A Decades-Old Linux Backdoor Has Been Discovered.

  • Secret Backdoor Affects More Fortinet Firewalls

    Several current systems could fall victim to the attack

  • Data Poisoning

    Machine learning can be maliciously manipulated – we'll show you how.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News