Popping the Penguin - An Introduction to the Principles of Linux Persistence

Popping the Penguin - An Introduction to the Principles of Linux Persistence

BSidesLV via YouTube Direct link

Hackers

3 of 23

3 of 23

Hackers

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Popping the Penguin - An Introduction to the Principles of Linux Persistence

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why this talk?
  3. 3 Hackers
  4. 4 Logs: Log shipping
  5. 5 Logs: Event Correlation and Mitigation
  6. 6 User accounts: Going Rogue
  7. 7 Iser accounts: /etc/passwd & shadow
  8. 8 User accounts: mitigation
  9. 9 Netcat
  10. 10 Listening ports
  11. 11 Reverse connections
  12. 12 Method 2: Crontab (syntax)
  13. 13 What's the point of all this?
  14. 14 1/0 redirection: output
  15. 15 1/0 redirection: the pipe
  16. 16 1/0 redirection: input
  17. 17 1/0 redirection: identifying files
  18. 18 1/0 redirection: execution
  19. 19 dev/tcp - the command
  20. 20 IDS/IPS evasion: the reason
  21. 21 IDS/IPS evasion: execution
  22. 22 Wrapping it all up: Mitigation
  23. 23 Resources

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.