Completed
Why this talk?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Popping the Penguin - An Introduction to the Principles of Linux Persistence
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why this talk?
- 3 Hackers
- 4 Logs: Log shipping
- 5 Logs: Event Correlation and Mitigation
- 6 User accounts: Going Rogue
- 7 Iser accounts: /etc/passwd & shadow
- 8 User accounts: mitigation
- 9 Netcat
- 10 Listening ports
- 11 Reverse connections
- 12 Method 2: Crontab (syntax)
- 13 What's the point of all this?
- 14 1/0 redirection: output
- 15 1/0 redirection: the pipe
- 16 1/0 redirection: input
- 17 1/0 redirection: identifying files
- 18 1/0 redirection: execution
- 19 dev/tcp - the command
- 20 IDS/IPS evasion: the reason
- 21 IDS/IPS evasion: execution
- 22 Wrapping it all up: Mitigation
- 23 Resources