• 6) Creating Backdoors in the System
  • How to make a backdoor
  • ) Continuing the Access with the Systems




    Download 6,34 Mb.
    Pdf ko'rish
    bet175/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   171   172   173   174   175   176   177   178   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    5) Continuing the Access with the Systems


    Hackers are crazy and like to do things that can be repeated. When a hacker
    compromises a system, he tries to expand the time he spends therewith
    using tools called rootkits. Rootkits are hackers' tools and will delete
    everything or footprints that he leaves while hacking effectively. Apart from
    this hacker also has a fudge to get access as many systems as possible. For
    this character trait, they usually try to get access to /etc folder and access all
    the user passwords that are present. Rootkits will help the hacker in
    extending his connection or relation with the system in a definite way. 
    If the hacker is gaining money with this method, he may get accustomed to
    the fact that many are trying the same. So, he will make sure that the
    vulnerability he has found is not available to anyone. For this reason, he
    makes shell scripting code that will spoof the other attackers and make
    them not access the system. Hackers also in this process exploit as much as
    they can and will back up important files or sensitive information into their
    directory using network packeting tools and delete those traces forever.
    6) Creating Backdoors in the System
    After getting access to a system for a long time and understanding every
    pathway and directory system intelligent hackers create backdoors to
    continue their exploitation even if the vulnerability is patched. It is often
    difficult for security administrators to determine a backdoor until it causes
    system damage because they are often cleverly inserted into the system by
    hackers. In this section, we will discuss backdoor and how to make one. 
    How to make a backdoor:
    1) First of all, look at the system as you are in-depth and try to change the
    system code in a way such that you can easily get access to the system for
    the next time. 
    2) Backdoor injection tools will have the ability to send the password
    changing information using its exploitation tools that are present. 
    3) Backdoors can also be created in a clumsy manner and of a lot of
    variables with weird names so that the programmers can never detect the
    original attacker. This anti-spoofing mechanism will lead to a change of the


    system code which will be easily obtained by the hacker using the other
    backdoors he has implemented. 
    By this, we have given a complete tour of how a hacker's mind works. It
    may feel overwhelming sometimes, but hackers work it out in a hard way.
    So, if you want to be a professional hacker you need to create your working
    process or follow this straightforward methodology that has been said by
    many famous hackers .
    In the next section, we will discuss the ethical hacking toolkit or
    prerequisites a hacker should be aware of before starting web hacking and
    network hacking for testing the quality of the systems. Follow along with
    this checklist and use it whenever you are starting an attack. 

    Download 6,34 Mb.
    1   ...   171   172   173   174   175   176   177   178   ...   203




    Download 6,34 Mb.
    Pdf ko'rish