To create a backdoor in Linux, we will use the following recipe:
- Validate the IP addresses of your machines before we get started.
- In this case, we will be starting from a machine that has already been exploited; we will shortcut this exercise by accessing the Metasploitable machine through SSH.
If you want, you can continue this recipe from Chapter 7, Privilege Escalation.
- On your Kali machine start Armitage.
- From Armitage, let's add the Metasploitable host if it is not already present. For this recipe, my Metasploitable machine is 192.168.56.101. If required, scan, nmap, and run the attack vectors against the Metasploitable device.
See Chapter 4, Finding Exploits in the Target for information on using Armitage.
- Right-click ...