|
Example of a Trojan
Assume, root has path set as follows: PATH=.:$PATH
Hacker puts the script in /tmp and gives it name ls
When root comes in /tmp and executes ls it creates a back
door for the hacker.
When a user executes
/tmp/.sh -p
he becomes root.
|
This trojan can be found with find command:
Very often, Trojans come with a new software.
Verify developers signatures using checksums or GPG/PGP tools.
Exercise
Perform the exercise below on smbhost VM that you have deployed in the previous lesson.
Figure out the IP address of smbhost:
Initiate two SSH conections to smbhost from the different terminal windows. For example, the IP address of smbhost is 192.168.122.42.
Do the same SSH command in the other terminal window.
While login as user hostadm, create the script, ls, in /tmp, then
In the other terminal, become root
Modify your path variables by including ".", step into /tmp, and execute command ls:
In the other terminal window, where the user is not root, hostadm,
then see what happens.
When you finish with the exercise, DON'T FORGET to remove /tmp/.sh !!!
|
|