CHAPTER

10

APT Software Backdoors

In this chapter, we’ll design and write custom software backdoors that will fit our needs for all of our different attacks. We’ll get down and dirty into the details of the functionality we’ll want from our software backdoors and cover these features in a modular way, allowing you to pick and choose features based on the specific context of your attack.

At this point, there are elements within our design that should go without saying: keeping it simple, elegance, preparation, focusing on efficacy, and others. These concepts have been integral to all phases of attack and will manifest themselves in building the best backdoor to suit our needs. We also won’t perform a full recap of all of the features that are ...

Get Advanced Persistent Threat Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.