27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Please note that if this keylogger remains invisible from the list <strong>of</strong> Windows processes, other tools<br />

dedicated to process monitoring will reveal it to a watchful eye. Please refer to our chapter on<br />

monitoring.<br />

3.Backdoors and rootkits<br />

A) Backdoor applicative<br />

This type <strong>of</strong> backdoor is generally uploaded on the system by the hacker once he has obtained<br />

access. On both Linux and Windows, it can be an applicative running as a server to bind a shell, or it<br />

can send back this access to the hacker with reverse connection methods. Following this principle, a<br />

simple netcat could do. Of course, the main problem for the hacker with this type <strong>of</strong> backdoor is that<br />

they are in no way discreet.<br />

To automatically launch a backdoor when starting the system, there are several possibilities:<br />

On Windows:<br />

➢ Installation in the start menu<br />

Each user's start menu is a directory accessible in the personal directory <strong>of</strong> each user, allowing him to<br />

start an applicative at the start <strong>of</strong> a system. All that has to be done is to copy any executable in order<br />

to have it automatically launched at boot.<br />

➢ The register base<br />

On Linux:<br />

➢ rcX.d files<br />

All services launched when the system is started are placed in the rc.init directory. They are started<br />

according to a specific runlevel, from 1 to 6. To be activated at the start, a symlink must be created in<br />

the rcX.d file corresponding to the proper runlevel.<br />

RUNLEVEL DETAIL<br />

0 System stopped<br />

1 Starting mono user<br />

2 Starting multi-user without network<br />

3 Starting multi-user with network<br />

4-5 Starting multi-user, Xwindow network<br />

6 Restarting<br />

To placer a backdoor on the system:<br />

#cp backdoor /etc/init.d/<br />

#cd /etc/rc3.d<br />

#ln -s /etc/init.d/rc3.d<br />

The <strong>Hack</strong>ademy DMP -178/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!