Using cymothoa to create a Linux backdoor
In this recipe, we will use cymothoa to maintain Linux system access through the use of a backdoor.
Getting ready
Let's ensure the following prerequisites:
- Your Kali Linux VM is powered up and you are logged in as root
- Your Metasploitable VM is powered up on the host-only network
How to do it...
To create a backdoor in Linux, we will use the following recipe:
- Validate the IP addresses of your machines before we get started.
- In this case, we will be starting from a machine that has already been exploited; we will shortcut this exercise by accessing the Metasploitable machine through SSH.
Note
If you want, you can continue this recipe from Chapter 7, Privilege Escalation.
- On your Kali machine start Armitage.
- From Armitage, let's add the Metasploitable host if it is not already present. For this recipe, my Metasploitable machine is
192.168.56.101
. If required, scan, nmap, and run the attack vectors against the Metasploitable device.
Note
See Chapter 4, Finding Exploits...