Jump to content
begood

Placing Backdoors Through Firewalls 1.5

Recommended Posts

Posted

----[ Introduction

This article describes possible backdoors through different firewall architectures. However, the material can also be applied to other environments to describe how hackers (you?) cover their access to a system.

Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which a) does it's job and B) is not easily detectable. The kind of backdoor needed depends on the firewall architecture used.

As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included, so have fun.

more : Placing Backdoors Through Firewalls

Posted

Destul de bunicel bind-ul :), pe cateva mi-a mers, mersi pentru post.

Ceea ce vream sa va intreb ce aveti pentru asta ::::?

(eu am incercat tot ce am stiut (bind, local ex.,) si nu reusesc sa ii deschid un port sau sa ii citesc /etc/shadow)...Spuneti ce as mai putea incerca ?? :) Thanks

Linux buchalter 2.6.32.8-grsec-2.1.14-modsign-xeon-64 #2 SMP Sat Mar 13 00:42:43 PST 2010 x86_64

id : uid=2375673(swatt123) gid=397757(pg1472520) groups=397757(pg1472520)

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...