O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

To create a backdoor in Linux, we will use the following recipe:

  1. Validate the IP addresses of your machines before we get started.
  2. In this case, we will be starting from a machine that has already been exploited; we will shortcut this exercise by accessing the Metasploitable machine through SSH.
If you want, you can continue this recipe from Chapter 7, Privilege Escalation.
  1. On your Kali machine start Armitage.
  2. From Armitage, let's add the Metasploitable host if it is not already present. For this recipe, my Metasploitable machine is 192.168.56.101. If required, scan, nmap, and run the attack vectors against the Metasploitable device.
See Chapter 4Finding Exploits in the Target for information on using Armitage.
  1. Right-click ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required