Techniques for building a hidden backdoor

SECRET PASSAGE

Author(s):

Backdoors give attackers unrestricted access to a zombie system. If you plan to stop the bad guys from settling in, you’ll be interested in this analysis of the tools they might use for building a private entrance.

After launching a successful attack, a malevolent hacker will not just sit back and rest. Exploiting a vulnerability and gaining root privileges is just half the story. As a rule, attackers are more interested in continuing to exploit the machine by launching attacks from it. To make this easier, an attacker will typically try to manipulate the victim machine after gaining initial access.

Read full article as PDF:

Backdoors.pdf  (352.46 kB)

Related content

comments powered by Disqus

Direct Download

Read full article as PDF:

Backdoors.pdf  (352.46 kB)

News