Skip to content

Commit 6266e8a

Browse files
authored
Update Linux-backdoor.md
1 parent a32b65c commit 6266e8a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

random/linux-backdoor.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Of course, you can adapt this systemd service file as `init` script as well. How
119119

120120
**Testing scope**
121121

122-
The instructions has been tested and work as expected. You gain root access on the victim's Linux machine, no matter which network the victim has connected to. According to my remote tester (who was behind NAT), the opened hostile bash shell process is not visible on graphical system monitor view (this applies to XFCE, at least).
122+
The instructions has been tested and work as expected. You gain root access on the victim's Linux machine, no matter which network the victim has connected to. You don't need to care about passwords either since the backdoor is executed as root during system boot-up. Actually, you can change the password and do what the hell you want on the victim's Linux machine. According to my remote tester (who was behind NAT), the opened hostile bash shell process is not visible on graphical system monitor view (this applies to XFCE, at least).
123123

124124
Victim can still detect the hostile shell process, other processes and opened network sockets with `netstat/sockstat` commands. However, distinguishing them from friendly processes is another thing...
125125

0 commit comments

Comments
 (0)