Perl Linux/Unix viruses

One way we can obtain login credentials is by masquerading malicious software as legitimate authentication software. For instance, during a post-exploitation examination on a rooted target client system, we can replace the binary for the SSH application with a simple Perl script of our own, which sends the login credentials to our malicious server before actually making an SSH connection. A few Perl modules exist that can handle SSH connections, but when used on compromised systems, they are not as efficient as simply gathering credential data and calling the native SSH application directly. They can take lengthy installs, use many dependencies, and even produce unwanted output, which can give our presence away to the target ...

Get Penetration Testing with Perl now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.