begood Posted April 5, 2010 Report Posted April 5, 2010 ----[ IntroductionThis article describes possible backdoors through different firewall architectures. However, the material can also be applied to other environments to describe how hackers (you?) cover their access to a system.Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which a) does it's job and is not easily detectable. The kind of backdoor needed depends on the firewall architecture used.As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included, so have fun. more : Placing Backdoors Through Firewalls Quote
linux_terminal Posted April 6, 2010 Report Posted April 6, 2010 Destul de bunicel bind-ul , pe cateva mi-a mers, mersi pentru post.Ceea ce vream sa va intreb ce aveti pentru asta ::::?(eu am incercat tot ce am stiut (bind, local ex.,) si nu reusesc sa ii deschid un port sau sa ii citesc /etc/shadow)...Spuneti ce as mai putea incerca ?? ThanksLinux buchalter 2.6.32.8-grsec-2.1.14-modsign-xeon-64 #2 SMP Sat Mar 13 00:42:43 PST 2010 x86_64id : uid=2375673(swatt123) gid=397757(pg1472520) groups=397757(pg1472520) Quote
Flubber Posted April 6, 2010 Report Posted April 6, 2010 exploit pentru linux 2.6 => uid=0 (root) apoi rootkit -> stergere loguri si apoi backdooriar pentru firewall, iptables Quote