Popping the Penguin - An Introduction to the Principles of Linux Persistence

Popping the Penguin - An Introduction to the Principles of Linux Persistence

BSidesLV via YouTube Direct link

Reverse connections

11 of 23

11 of 23

Reverse connections

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Popping the Penguin - An Introduction to the Principles of Linux Persistence

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why this talk?
  3. 3 Hackers
  4. 4 Logs: Log shipping
  5. 5 Logs: Event Correlation and Mitigation
  6. 6 User accounts: Going Rogue
  7. 7 Iser accounts: /etc/passwd & shadow
  8. 8 User accounts: mitigation
  9. 9 Netcat
  10. 10 Listening ports
  11. 11 Reverse connections
  12. 12 Method 2: Crontab (syntax)
  13. 13 What's the point of all this?
  14. 14 1/0 redirection: output
  15. 15 1/0 redirection: the pipe
  16. 16 1/0 redirection: input
  17. 17 1/0 redirection: identifying files
  18. 18 1/0 redirection: execution
  19. 19 dev/tcp - the command
  20. 20 IDS/IPS evasion: the reason
  21. 21 IDS/IPS evasion: execution
  22. 22 Wrapping it all up: Mitigation
  23. 23 Resources

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.