Using cymothoa to create a Linux backdoor
In this recipe, we will use cymothoa to maintain Linux system access through the use of a backdoor.
Getting ready
Let's ensure the following prerequisites:
- Your Kali Linux VM is powered up and you are logged in as root
- Your Metasploitable VM is powered up on the host-only network
How to do it...
To create a backdoor in Linux, we will use the following recipe:
- Validate the IP addresses of your machines before we get started.
- In this case, we will be starting from a machine that has already been exploited; we will shortcut this exercise by accessing the Metasploitable machine through SSH.
Note
If you want, you can continue this recipe from Chapter 7, Privilege Escalation.
- On your Kali machine start Armitage.
- From Armitage, let's add the Metasploitable host if it is not already present. For this recipe, my Metasploitable machine is
192.168.56.101. If required, scan, nmap, and run the attack vectors against the Metasploitable device.
Note
See Chapter 4, Finding Exploits...