O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Perl Linux/Unix viruses

One way we can obtain login credentials is by masquerading malicious software as legitimate authentication software. For instance, during a post-exploitation examination on a rooted target client system, we can replace the binary for the SSH application with a simple Perl script of our own, which sends the login credentials to our malicious server before actually making an SSH connection. A few Perl modules exist that can handle SSH connections, but when used on compromised systems, they are not as efficient as simply gathering credential data and calling the native SSH application directly. They can take lengthy installs, use many dependencies, and even produce unwanted output, which can give our presence away to the target ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required