1 00:00:06,880 --> 00:00:14,710 Welcome in this lecture we are going to see how the hackers create a backdoor in Linux systems. 2 00:00:14,710 --> 00:00:22,800 Basically here we are going to create a real world which is by Tomsky and then we send that file with 3 00:00:22,800 --> 00:00:25,580 him when we can make sure that's clear. 4 00:00:25,870 --> 00:00:32,280 We get a backdoor to access the machine so to create a Magura file 5 00:00:35,400 --> 00:00:46,610 and myself I know I can be by tone slash operator slash but he was on DCP. 6 00:00:48,260 --> 00:00:49,840 As we know that happened. 7 00:00:49,860 --> 00:01:01,960 He indicates which people ought to be use now said local host and local food type host because we're 8 00:01:02,090 --> 00:01:18,050 do not 160 It would be through Daut if the one similarly to set up for I elbowed because the and last 9 00:01:18,300 --> 00:01:24,440 you the name and part of the file made you want to say no. 10 00:01:24,540 --> 00:01:25,050 And the 11 00:01:29,980 --> 00:01:34,400 as again see here or below it is created. 12 00:01:34,410 --> 00:01:44,570 Now let's clear the air handler to listen if he was going to and from that a good machine so I MSF gunsel 13 00:01:45,500 --> 00:01:47,050 One us right 14 00:01:53,690 --> 00:02:01,700 now it was that händler I used Mudie's slash händler 15 00:02:04,340 --> 00:02:11,550 next time said Lord my tone slash 16 00:02:14,030 --> 00:02:28,760 slash that he was under school ECP who said Filmore now to said local host and local food I said Al 17 00:02:28,810 --> 00:02:36,550 host when I do that 160 43 don't say when. 18 00:02:36,620 --> 00:02:43,760 Similarly it was said local port number on which we are awake to listen on the machine. 19 00:02:44,490 --> 00:02:57,800 So I said and would it be now i wouldn't it was dark last night as McKenzie. 20 00:02:57,850 --> 00:03:00,060 Now we are ready to listen in. 21 00:03:00,150 --> 00:03:01,040 Connection. 22 00:03:02,950 --> 00:03:09,210 So here I'm using my local Apache tools that will send this payload with the machine. 23 00:03:10,930 --> 00:03:25,600 Now we the OR and go to where WW Educ. DML for the and Bastet notice. 24 00:03:25,620 --> 00:03:27,230 Doctor you had a budget rules that were 25 00:03:30,260 --> 00:03:41,150 interminable and I stories about you to start now. 26 00:03:41,350 --> 00:03:43,080 Let's go to the machine. 27 00:03:44,480 --> 00:03:52,220 And I when I do do double 60 and dark $43 if you say one 28 00:03:55,210 --> 00:03:57,340 year is right on fine. 29 00:03:57,820 --> 00:04:08,390 Now it's done and run these as the Kenzi I downloaded and it on the XTO. 30 00:04:08,490 --> 00:04:22,500 Now EXit good these new terminal and Judy that include rectal now by Lite-On my dog you like 31 00:04:26,360 --> 00:04:29,480 as you can see real easy exit. 32 00:04:30,900 --> 00:04:33,230 So let's go to our daily machine. 33 00:04:35,080 --> 00:04:40,550 As against the hint we got a we did a production. 34 00:04:40,740 --> 00:04:47,130 So that's how the hackers cleared it back in Linux systems. 35 00:04:47,240 --> 00:04:47,980 Thank you.