• Post category:StudyBullet-9
  • Reading time:3 mins read


Detect and Create Linux Backdoors

What you will learn

Basic Linux security

How to Find a Backdoor on a Linux system

Techniques to Create a Backdoor on a Linux system

Why Anti-Virus is not enough

Description

AΒ linux backdoor is usually a tool that allows you to forward connect to a server by using ssh and then execute commands on the remote machine. But it could also be a reverse shell, where instead the server connects to your attack box and lets you run commands on the server. . A backdoor can be placed in a file belonging to an unsuspecting user, e.g. in .bashrc, .profile or .login. But there are many more ways a backdoor can be installed.

In this course you will learn about various ways a backdoor can be installed on Linux. You will learn how hackers can compromise your system and to do it yourself.Β  The backdoor runs hidden and is usually not visible in the process list. It allows the remote user to run arbitrarily defined commands on the victim’s machine without them knowing it.


Get Instant Notification of New Courses on our Telegram channel.


The usual security advise is apply patches provided by your OS vendor as soon as possible. Additionally, running only necessary processes with elevated privileges should be considered – especially on publicly facing servers and workstations. But that isn’t enough, so in this course you will learn how to detect a backdoor.

It is a beginners course. You don’t need prior knowledge except basic Linux knowledge, like the basic commands. It helps if you have some knowledge on Linux servers. If you want to check your system for backdoors or if you want to install backdoors yourself, this course is for you.

English
language

Content

Introduction

Introduction
SSH Backdoor
Detect SSH Backdoor
PHP Backdoor (Web Shell)
Detect PHP Backdoor (Web Shell)
PHP Reverse Shell Backdoor
Cronjob Backdoor
Bashrc Backdoor