Techniques for building a hidden backdoor

SECRET PASSAGE

Article from Issue 77/2007
Author(s):

Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

After launching a successful attack, a malevolent hacker will not just sit back and rest. Exploiting a vulnerability and gaining root privileges is just half the story. As a rule, attackers are more interested in continuing to exploit the machine by launching attacks from it. To make this easier, an attacker will typically try to manipulate the victim machine after gaining initial access.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Honeynet

    Security-conscious admins can use a honeynet to monitor, log, and analyze intrusion techniques.

  • News

    In the news: Linux Mint Dropping Blueberry Bluetooth Configuration Tool; Fedora 36 Beta Now Has a Release Date; AV Linux MX-21 Released for All Your Audio/Video Production Needs; Slax Proves You Can't Keep a Good Linux Distribution Down; Dirty Pipe Might Be the Most Severe Vulnerability to Hit Linux in Years; and A Decades-Old Linux Backdoor Has Been Discovered.

  • Secret Backdoor Affects More Fortinet Firewalls

    Several current systems could fall victim to the attack

  • How to Write a Rootkit

    Today’s rootkits infiltrate a target system at kernel level, thus escaping unwanted attention from administrators. Read on for a practical look at how a kernel rootkit really works.

  • Sneaky New Linux Attack Discovered

    Innovative back door looks like normal SSH traffic.

comments powered by Disqus

Direct Download

Read full article as PDF:

Backdoors.pdf  (352.46 kB)

News