Archive for backdoor

You are browsing the archives of backdoor.

Encryption Ensures Privacy

Encryption techniques are mathematically designed to be uncrackable, at least in an amount of time that relates to the value of the secret. This means the time and computing resources needed to successfully attack the encryption will cost more than the attacker is willing to spend. More computing power means less time. If it takes […]

Backdoor Meltdown

If the NSA has managed to inject backdoor access into most U.S. produced technology, they can win a victory in the intelligence war, but we the citizens may find it necessary to abandon some of the use of American technology ourselves. If we can make our enemies afraid that we can access their computers and […]

Falling or Ballistically-launched Object that Makes Backdoors

DARPA-Funded Hacker’s Tiny $50 Spy Computer Hides In Offices, Drops From Drones – [forbes.com] At the Shmoocon security conference Friday in Washington D.C., O’Connor plans to present the F-BOMB, or Falling or Ballistically-launched Object that Makes Backdoors. Built from just the hardware in a commercially-available PogoPlug mini-computer, a few tiny antennae, eight gigabytes of flash […]

Kneber-Zeus

A trojan horse backdoor called “Zeus” is being used by a botnet named “Kneber” by researchers. This botnet has been operational for over a year and has compromised many organizations and collected a vast amount of data that was intended to be confidential. Hackers Mount New Strike – [wsj.com] Hackers in Europe and China successfully […]

Meterpreter Persistence

The Metasploit Framework is a framework that enables penetration testing by combining modular packages of exploit code, payloads and tools such as Meterpreter that allow the tester to maintain access, collect information on the target system and execute pivot attacks against other systems. This script helps the tester by maintaining backdoor access. Meterpreter Persistence – […]

Netcat

Netcat is a very simple tool that can accomplish some fairly sophisticated tasks. At its most simple, netcat makes connections to or from both TCP and UDP ports. It can be used to connect to some service that is listening for a connection or it can be set as a listener waiting for a connection. […]

Ensure future access

Once high privileges are established and an account for future use is established, the next need is to ensure there is a pathway for future access. Use a penetration agent/rootkit – both Core Impact and Canvas offer tools with rootkit like abilities to establish connections back out of the system. In some cases, they can […]