Results 1 to 9 of 9

Thread: backdoors

  1. #1
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    2

    Default backdoors

    Hello,

    I would like to know more about different types of backdoors, where to get them, and how to use them.

    I have searched Google many times, but I can't find any good information.

    If anyone knows where to find such information that would be very helpful. Thank you.

  2. #2
    Member ColForbin's Avatar
    Join Date
    Jan 2010
    Posts
    93

    Default Re: backdoors

    I would check the following link first, as a primer for locating and using back doors. Hope this helps:

    Doors that could be used for back doors
    "Whatever happened to playing a hunch, Scully? The element of surprise, random acts of unpredictability? If we fail to anticipate the unforeseen or expect the unexpected in a universe of infinite possibilities, we may find ourselves at the mercy of anyone or anything that cannot be programmed, categorized or easily referenced."

  3. #3
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default Re: backdoors

    Damn, is it time for amateur hour again? Already? That means the next couple of questions will be: "Where can I the password cracker I saw in War Games?", followed by the ever popular "How can I hack a bank tonight and make millions?"

    You need to look for backdoors in the Matrix here, Neo: http://2.bp.blogspot.com/_DeutwC_pLZ...ap-2539037.png

    Just in case you're actually serious and don't understand the sarcasm here, your problem is your jargon. No one who works at this stuff actually calls them 'backdoors'. That's Hollywood. Search the web for 'exploits' in relation to other terms such as 'applications', 'programs', and 'web applications'.

    There, now I've done my good deed for this month.
    Thorn
    Stop the TSA now! Boycott the airlines.

  4. #4
    Just burned his ISO herrdign's Avatar
    Join Date
    Sep 2010
    Posts
    6

    Default Re: backdoors


  5. #5
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    2

    Default Re: backdoors

    Ha ha, very funny ColForbin. Those aren't of much use to me.

    Thorn: What I want is to know more about post exploitation. I have not come across any other terms for 'backdoors'. Could you please enlighten me as to what they are called?

    I am not looking for 'exploits'. I am looking into how to get access to a system after exploitation, more specifically with Metasploit. I have already tried Netcat, Metsvc, and persistent Meterpreter. I want to know more about alternitaves to those.

  6. #6
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default Re: backdoors

    Quote Originally Posted by BT4isgreat View Post
    Ha ha, very funny ColForbin. Those aren't of much use to me.

    Thorn: What I want is to know more about post exploitation. I have not come across any other terms for 'backdoors'. Could you please enlighten me as to what they are called?

    I am not looking for 'exploits'. I am looking into how to get access to a system after exploitation, more specifically with Metasploit. I have already tried Netcat, Metsvc, and persistent Meterpreter. I want to know more about alternitaves to those.
    Please explain what exactly you're trying to do, because what you've written doesn't make much sense. If you know how to use tools such as Metesploit and NetCat, then it would appear that already know how to gain access to a system via 'backdoors'.
    Thorn
    Stop the TSA now! Boycott the airlines.

  7. #7
    Good friend of the forums espreto's Avatar
    Join Date
    Mar 2010
    Location
    Brazil
    Posts
    303

    Default Re: backdoors

    I have searched Google many times, but I can't find any good information.
    Are you serious?

    Please explain what exactly you're trying to do, because what you've written doesn't make much sense. If you know how to use tools such as Metesploit and NetCat, then it would appear that already know how to gain access to a system via 'backdoors'.
    Just as the Thorn said. Say what you have tried and what you have in mind.

    I recommend reading.

    Amazon.com: Rootkits: Subverting the Windows Kernel (9780321294319): Greg Hoglund, Jamie Butler: Books
    Amazon.com: The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System (9781598220612): Bill Blunden: Books

    Regards,
    (gdb) disass m(y_br)ain

    ®

  8. #8
    Just burned his ISO
    Join Date
    Feb 2010
    Posts
    7

    Default Re: backdoors

    In a word 'Rootkits'

    Find and learn all about the latest rootkits for your chosen target OS.

    In brief, a rootkit replaces some system daemons and other files with specifically crafted ones that have a 'backdoor' built-in to allow access by the attacker at a later date without needing to re-exploit and they try to be very covert and hide their exstance etc.

  9. #9
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default Re: backdoors

    Well we all got some good lolz out of this rubbish.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

Similar Threads

  1. Favorite backdoors and roots
    By jhonnycage828 in forum OLD General IT Discussion
    Replies: 3
    Last Post: 01-13-2010, 07:48 PM
  2. I want to code simple backdoors, small in size...
    By BigMac in forum OLD Programming
    Replies: 9
    Last Post: 09-07-2009, 12:58 AM
  3. Metasploit payloads as backdoors?
    By cr1spyj0nes in forum OLD Newbie Area
    Replies: 28
    Last Post: 07-02-2009, 11:20 PM
  4. A nifty article on CPU backdoors
    By imported_vvpalin in forum OLD Specialist Topics
    Replies: 5
    Last Post: 06-24-2009, 05:27 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •