In this recipe, we will use cymothoa to maintain Linux system access through the use of a backdoor.
Using cymothoa to create a Linux backdoor
Getting ready
Let's ensure the following prerequisites:
- Your Kali Linux VM is powered up and you are logged in as root
- Your Metasploitable VM is powered up on the host-only network
How to do it...
To create a backdoor in Linux, we will use the following recipe:
- Validate the IP addresses of your machines before we get started.
- In this case, we will be starting from a machine that has already been exploited; we will shortcut...