Linux backdoor technology is free of contact

Source: Internet
Author: User
Linux backdoor technology is free of contact-Linux general technology-Linux programming and kernel information. The following is a detailed description. Maybe you are still studying the vulnerabilities in the win System Series. For example, you can use port 1433 to find a small domestic win bot. At that time, I was wondering, are you suitable? Do you feel blushing when you attack and intrude on machines in your country? Some cainiao have recently said they want to attack Japanese websites. They are patriotic and I don't want to oppose it, but they are always using ddos attacks with no technical content. I am wondering, in this way, can you attack Japan? Most Japanese websites are linux systems. Do you know that all-day ddos attacks are feasible in Japan? It is better to control their machines. this is my opinion of Urban hunters and it has nothing to do with the Chinese Hacker Alliance!

Now, let's get started. We all know that linux is more secure than win. We have worked hard to intrude into a linux system, which can be said to be more time-consuming than win in the traditional sense, we have to leave a backdoor so that we can easily access its system again. So, let's take a look at the linux backdoor.

Common win backdoors are related key values created in the registry, and several files will be created under the system32 file. If you delete the win backdoors, you must stop the related services.

Let's take a look at linuxlinux. I will use my virtual linuxplatform to demonstrate how to run the environment rh9and putty.exe

First, we connect to my linux system. The LS command is equivalent to the dir command under win. Now you can see that there are only three files in my machine Huaxia 77169 (later referred to as hx77169, now let's create a backdoor.

In the hx77169 host, we create one. C file to test, first use vi to create a file and enter the following code Vi is an editing tool for linux, which edits cdwsxm. c. If this file does not exist, cdwsxm will be automatically created. c file (cdwsxm, which means you don't know only a few members in China know about J). After Entering the code and saving it, let's take a look at the current folder.



Now let's compile the Code directly, because the code just now is c (this can be seen by people with a little foundation, therefore, we can only use the gcc for compiling c Programs in linux. The compilation content is as follows:

[Root @ hx77169 root] # gcc? Co test cdwsxm. c

In this case, we created a demo in the root directory, so the test folder will be generated in the/root directory after compilation. Then we enter./test &
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.