lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed Apr 13 01:38:11 2005 From: sanandres at gmail.com (Sumy) Subject: Placing Backdoors Through Firewalls ---[ Placing Backdoors Through Firewalls ]--- v1.5 Author: van Hauser / THC ----[ Introduction This article describes possible backdoors through different firewall architectures. However, the material can also be applied to other environments to describe how hackers (you?) cover their access to a system. Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which a) does it's job and b) is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included, so have fun. Full Article: http://www.exploitx.com/forum/azbb.php?1113350365 -- Security Portal: http://www.exploitx.com Forum: http://www.exploitx.com/forum/
Powered by blists - more mailing lists