Chapter 6. Maintaining Access with Backdoors and Rootkits
Information in This Chapter:
■ Netcat: The Swiss Army Knife
■ Netcat’s Cryptic Cousin: Cryptcat
■ Netbus: A Classic
■ Rootkits
■ Hacker Defender: It Is Not What You Think
■ Detecting and Defending Against Rootkits
Many exploits that provide remote access are fleeting. Often, the access to the system lasts only as long as the parent process is running or until the system is rebooted. In most cases, a penetration tester needs the ability to return to the system at a later date. In these cases, once the system has been compromised, a more permanent and stable backdoor is added to the system. This chapter introduces the powerful and flexible tool Netcat. Several uses of Netcat, including implementing ...
Get The Basics of Hacking and Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.