12 Backdoor & Reverse Shell

Coding Studio
28 Sept 202108:29

Summary

TLDRThis video script delves into the concepts of backdoors and reverse shells in cybersecurity. It explains how backdoors are unauthorized access tools that bypass authentication, with examples of PHP backdoors like c99, becak, r57, and punycode. The script also covers reverse shells, which are used to listen for incoming connections, allowing an attacker to gain access to a host. Practical demonstrations using Kali Linux are provided, including setting up a local PHP server and executing commands through a reverse shell, showcasing the real-world application of these cybersecurity techniques.

Takeaways

  • 🔒 The script discusses 'backdoor' as a software device created to access a system without authentication.
  • 📂 It explains how an attacker uploads a backdoor file and uses it to access a server without the server's mechanism.
  • 🌐 The variety of backdoors available online is vast and depends on the programming language, with examples given in PHP like c99, becak, r57, and paunisel.
  • 💻 The script covers 'reversal', which is an activity where an attacker listens for incoming connections, aiming to gain access to a shell.
  • 📝 It describes the process of simulating and running a backdoor called 'fauni shell' using Kali Linux.
  • 📁 The importance of setting up a shell environment or downloading a shell from a specific website is highlighted.
  • 🖥️ Demonstrates how to run a local PHP server using a command to facilitate the execution of the backdoor.
  • 🛠️ The script includes running various commands within the shell, showcasing the capabilities of the backdoor.
  • 🔄 The concept of 'reversal shell' is introduced, where the attacker sets up a listening connection to gain a shell from the host.
  • 🔑 It explains the use of the 'nc' command with parameters for creating a listening connection and establishing a reverse shell.
  • 📍 The script concludes with an interactive demonstration of connecting to a host using a reverse shell and verifying the connection by issuing commands like 'PWD'.

Q & A

  • What is a backdoor in the context of the script?

    -A backdoor is a software tool created to access a system without the need for authentication. It allows an attacker to upload a file and later access the server using that backdoor without the server's mechanism.

  • What is the purpose of a backdoor in cybersecurity?

    -The purpose of a backdoor in cybersecurity is to provide unauthorized access to a system, often for malicious activities such as data theft or system control.

  • Can you name some examples of backdoors in PHP programming mentioned in the script?

    -The script mentions c99, becak, r57, and paunisel as examples of backdoors in PHP programming.

  • What is the difference between a backdoor and a regular system access method?

    -A backdoor bypasses the standard authentication process, whereas regular system access methods require credentials such as a username and password.

  • What is a reversal in the context of the script?

    -A reversal, in the script's context, refers to an activity where an attacker sets up a connection to a host that is in a listening state, allowing the attacker to gain access to the host's shell.

  • What is the significance of the term 'listening' in the context of reversals?

    -In the context of reversals, 'listening' refers to the state where a host is waiting for incoming connections, which an attacker can exploit to establish a shell connection.

  • What is the purpose of simulating and running a backdoor like 'fauni sel' in the script?

    -Simulating and running a backdoor like 'fauni sel' is to demonstrate how an attacker can gain unauthorized access to a system, which is crucial for understanding and defending against such attacks.

  • How does one create a local PHP server as mentioned in the script?

    -A local PHP server can be created using the command 'php-win.exe localhost 8108', which sets up a server on the localhost with port 8108.

  • What is the role of the 'nc' command in the script's context?

    -The 'nc' (netcat) command is used for setting up a listening port on the attacker's machine and for establishing a connection to the host's shell.

  • What does the '-e' option in the 'nc' command do in the script?

    -The '-e' option in the 'nc' command is used to specify the executable to run after a connection is made, in this case, to run a shell from the connected host.

  • How does the script demonstrate the connection between the attacker and the host?

    -The script demonstrates the connection by using two terminals, one representing the attacker and the other the host, and shows the process of establishing a shell connection using the 'nc' command.

Outlines

00:00

🔒 Introduction to Backdoors and Reversal Techniques

This paragraph introduces the concept of backdoors, which are unauthorized access tools that bypass authentication mechanisms. It explains how an attacker can upload a backdoor file and later access a system without the server's authentication process. The paragraph also touches on various types of backdoors available online, such as PHP-based shells like c99, becak, r57, and Paunch. It discusses the idea of 'reversal,' which is an activity where an attacker listens for incoming connections to gain access to a host. The speaker mentions setting up and running a backdoor called 'fauni' using Kali Linux and also performing a reversal. The paragraph concludes with instructions on how to simulate and execute the backdoor locally by creating a PHP server and accessing it through a browser.

05:00

🔄 Simulating Network Connections for Reversal

The second paragraph delves into the technical process of simulating network connections for the purpose of reversal. It describes changing directories to the desktop to differentiate between the attacker's and host's environments. The speaker explains how to use the 'nc' command with various parameters, such as '-lv' for listening mode, '-P' for port, and '-e' to execute a program after a connection is established. The paragraph illustrates how to set up a listening mode on a specific port and how to connect to it from the host's perspective using a local IP address and port number. The use of SSH (Secure Shell) is mentioned as an example of a command that could be executed after establishing a connection. The paragraph concludes with a demonstration of verifying the connection by checking the current directory, which confirms that the connection is made from the host's desktop directory.

Mindmap

Keywords

💡Backdoor

A backdoor refers to a secret or unauthorized access point to a computer system that bypasses normal authentication procedures. In the video's context, attackers use backdoors to gain unauthorized access to servers without the need for legitimate credentials. The script mentions the uploading of a backdoor file and the subsequent access to the server through this backdoor, illustrating the theme of unauthorized access and cybersecurity.

💡Authentication

Authentication is the process of verifying the identity of a user, device, or system as a prerequisite to allowing access to resources. The video discusses how backdoors allow bypassing this process, which is a critical aspect of maintaining system security. The script implies that a backdoor negates the need for authentication, thus compromising the security measures in place.

💡PHP

PHP is a server-side scripting language used for creating dynamic web pages. The script mentions PHP as the programming language for certain backdoors, such as 'c99', 'becak', 'r57', and 'Pau nisel', indicating the prevalence of backdoors in various programming languages and the importance of secure coding practices to prevent such vulnerabilities.

💡Backdoor Shell

A backdoor shell is a type of backdoor that provides a command-line interface to an attacker, allowing them to execute system commands remotely. The video's discussion of PHP backdoors and their ability to run system commands exemplifies the functionality of a backdoor shell in providing unauthorized control over a system.

💡Reversal

Reversal, in the context of the video, refers to the activity of setting up a listening connection by an attacker to intercept incoming connections. This is a technique used in cybersecurity to gain unauthorized access and control over a system. The script describes the process of an attacker setting up a listening connection to obtain a shell from the target host, demonstrating the concept of reversal in action.

💡Listening

In networking, listening refers to the state where a system or service is waiting for incoming connections. The video script describes an attacker setting up a listening connection, which is a crucial step in the reversal process to intercept and exploit incoming network traffic.

💡Kali Linux

Kali Linux is a Linux distribution designed for digital forensics and penetration testing. The script mentions using Kali Linux to simulate and run a backdoor, indicating its role as a platform for cybersecurity professionals to test and understand security vulnerabilities and exploit techniques.

💡PHP Server

A PHP server is a server configured to execute PHP scripts, allowing for the creation of dynamic web content. The video script describes setting up a local PHP server using 'php-win.exe localhost' to run a backdoor, illustrating the practical application of server setup in testing and understanding backdoor functionalities.

💡Terminal

A terminal is an interface that allows users to interact with the operating system through a command-line interface. The script refers to opening a terminal to execute commands and run a backdoor, highlighting the terminal's role in system administration and command execution.

💡NC (Netcat)

Netcat, often referred to as 'nc', is a utility used for reading from and writing to network connections using TCP or UDP. The video script discusses using 'nc' for creating a listening connection and establishing a reverse shell, demonstrating its use in network communication and exploitation techniques.

💡Port

A port is a numerical identifier in networking used to route messages to the correct application on a server. The script mentions setting up a listening connection on a specific port (9999) and connecting to it, which is essential for establishing a reverse shell and illustrates the importance of port management in cybersecurity.

Highlights

Introduction to backdoors and their purpose in accessing systems without authentication.

Backdoors are software tools used by attackers to upload files for unauthorized access.

Different types of backdoors exist, such as C99, Becak, R57, and Paunch, depending on the programming language.

Explanation of how backdoors can execute system commands once uploaded.

Reversal activity involves an attacker listening for incoming connections to gain access to a host.

Demonstration of setting up a local PHP server for testing backdoors.

Using the PHP command 'php-win.exe localhost' to create a server on port 8108.

Accessing the local PHP server through a web browser to view the backdoor interface.

Executing common commands through the backdoor to demonstrate its capabilities.

Simulating a scenario where an attacker uses a backdoor to gain access to a host.

Using two terminals to represent an attacker and a host for the simulation.

Running the 'nc' command to establish a reverse shell connection between the attacker and host.

Explanation of the 'nc' command parameters used for setting up the reverse shell.

Executing the reverse shell command 'nc -lvp 9999' to listen for incoming connections.

Connecting to the listening port using 'nc 127.0.0.1 9999' from the host side.

Using the '-e' parameter to execute a shell from the connected host.

Verification of successful access by checking the current directory with the 'PWD' command.

Conclusion of the session with a preview of the next video content.

Transcripts

play00:00

the

play00:03

Selamat datang kembali pada pertemuan

play00:06

kali ini kita akan belajar tentang

play00:07

backdoor dan juga reversal

play00:10

nah backdoor merupakan sebuah perangkat

play00:13

lunak yang dibuat untuk mengakses sebuah

play00:15

sistem tanpa harus melakukan autentikasi

play00:18

seperti lustrasi di bawah dimana

play00:20

attacker melakukan upload file back door

play00:23

dan setelah itu

play00:25

checker jika ingin mengakses server

play00:28

attacker dapat mengaksesnya dengan

play00:30

backdoor yang telah diupload sebelumnya

play00:33

tanpa harus melakukan mekanisme dari

play00:35

sisi server itu sendiri

play00:38

nah disini tergantung dari bahasa

play00:41

pemograman juga banyak sekali backdoor

play00:43

yang telah ada di internet contoh di

play00:46

sini ada backdoor sel dari bahasa

play00:48

pemograman PHP yaitu ada c99 ada becak

play00:53

r57 besok dan juga Pau nisel nah

play00:58

terlihat di Kanada

play01:00

contoh komunis sel dimana sebuah sel

play01:02

dari bahasa pemograman PHP yang dapat

play01:06

menjalankan perintah-perintah sesuai

play01:08

dengan sel sistem yang digunakan

play01:11

Nah di sini juga akan kita bahas yaitu

play01:14

reversal gimana reversal ini merupakan

play01:18

sebuah aktivitas sel yang dibuat dari

play01:20

koneksi host keteker yang sedang dalam

play01:23

kondisi listening atau attacker dalam

play01:27

kondisi dimana akan mendengarkan koneksi

play01:30

yang akan masuk seperti ilustrasi di

play01:32

bawah di Sini house akan melakukan

play01:35

koneksi keteker yang berada dikondisi

play01:38

listening agar nantinya attacker

play01:41

mendapatkan akses sel dari CEO situ

play01:44

sendiri

play01:45

Nah di sini juga kita akan

play01:47

mensimulasikan

play01:48

dan juga menjalankan salah satu backdoor

play01:52

yaitu fauni sel Ini lokal kalilinux kita

play01:55

dan juga menjalankan reversal

play01:58

menggunakan kalilinux juga nah namun

play02:01

disini sebelum itu kita bisa menyiapkan

play02:04

selnya atau teman-teman juga dapat

play02:07

langsung download Sel di lengket hope

play02:10

berikut dimana kitab.com + flash fauni

play02:15

strip sel nah lanjut disini juga

play02:19

kita melakukan Drag and drop untuk

play02:22

meng-copy

play02:23

Sigmund misalnya ke dalam kalilinux kita

play02:27

ini saya drag-and-drop dan saya letakkan

play02:30

di desktop itu sendiri

play02:33

nah disini kita akan mencoba

play02:35

mensimulasikan

play02:37

dan menjalankan Syifa unisel ini dengan

play02:41

cara yaitu Klik Kanan dan Open Terminal

play02:44

here

play02:46

disini kita akan mencoba menjalankan

play02:48

websitenya secara lokal yaitu dengan

play02:50

cara kita membuat PHP server dengan

play02:53

menggunakan perintah

play02:55

yaitu

play02:57

php-win.exe localhost

play03:00

2.2 Rp8.000 Maksudnya kita ingin membuat

play03:04

server PHP pada localhost dan port nya

play03:08

yaitu

play03:12

8108 membuka browser terlebih dahulu

play03:18

dan membuka

play03:20

i-look alhouse Rp8.000 dan dot PHP

play03:24

seperti ini nah ini merupakan tampilan

play03:27

dari CEO unisel itu sendiri Nah di sini

play03:31

juga kita bisa menjalankan berbagai

play03:34

macam printah contoh Disini saya akan

play03:36

menjalankan perintah umum

play03:39

nantinya dia akan dijalankan dan

play03:42

outputnya akan ditampilkan di sel ini

play03:46

seperti berikut

play03:48

nah lanjut disini juga kita akan mencoba

play03:52

menjalankan River sel

play03:55

dengan cara kita akan membuka dua

play03:58

Terminal terlebih dahulu ya dengan cara

play04:00

kita menekan tombol kontrol lt2 kali

play04:05

pertama Oke ini untuk Sel yang pertama

play04:08

dan kita menekan lagi control alt dan

play04:12

sel yang kedua nah disini akan saya

play04:14

rapikan terlebih dahulu untuk soalnya

play04:18

nah seperti ini

play04:25

nah disini kita akan mensimulasikan dua

play04:29

Terminal ini menjadi dua sel yang

play04:31

berbeda dimana sel kiri akan

play04:33

merepresentasikan sebagai attacker dan

play04:36

kan yang kanan akan merepresentasikan

play04:37

sebagai host dan simulasi kali ini

play04:40

attacker akan membuat River sel dan

play04:43

nantinya kost-an melakukan koneksi ke

play04:46

stacker agar attacker mendapatkan sel

play04:49

dari sihost namun sebelum itu untuk

play04:53

shiho sendiri disini saya akan saya

play04:55

tandakan yaitu Oz nah seperti ini

play04:58

kiosnya

play05:00

didik akan

play05:01

mengganti direktorinya kedalam direktori

play05:03

desktop untuk membedakan

play05:07

directory antara si Eta keur yang efek

play05:09

tersendiri di sini ada di direktori home

play05:12

sedangkan di kosnya yaitu di direktori

play05:15

desktop seperti ini nah disini untuk

play05:18

diet taker kita bisa menjalankan

play05:21

perintah NC atau nked lalu minus ha Nah

play05:28

untuk aplikasinya atau tulisnya di sini

play05:30

kita bisa menggunakan CNC atau bisa

play05:33

dibaca dengan enkev masa kita enter

play05:36

disini banyak sekali parameter yang

play05:38

telah disediakan nah Namun kita hanya

play05:41

akan menggunakan beberapa parameter

play05:44

untuk

play05:45

digitech-r itu sendiri yaitu ada minus l

play05:49

yaitu maksudnya listen mod Lalu ada

play05:52

verbos dan juga minus P atau port nah

play05:57

listen sendiri agar membuat ATM berada

play06:00

pada posisi mendengarkan koneksi dari

play06:03

yang masuk nantinya lalu untuk verbos

play06:07

digunakan untuk menampilkan pesan yang

play06:09

harusnya tidak ditampilkan oleh layer

play06:11

dan juga Mina sepi atau port berfungsi

play06:14

untuk menjalankan default mana nantinya

play06:17

kita akan menjalankan chiellini seperti

play06:20

itu

play06:21

Nah di sini untuk menjalankan

play06:24

perintahnya kita bisa menggunakan

play06:25

perintah NC minus

play06:29

lvp

play06:31

9999 Nah maksudnya Apa maksudnya itu

play06:36

kita akan menjalankan

play06:39

nked dengan kondisi listen dan portnya

play06:44

iPod

play06:46

9999 nah saat kita encer Makan disini si

play06:50

Eta keur sudah pada kondisi listen

play06:54

nah lanjut untuk diposisi house disini

play06:59

kita akan jalankan perintah

play07:03

nc127 itik 0.0.1 Nah karena kita ingin

play07:08

menjalankan di lokal kita bisa

play07:11

menggunakan IP

play07:12

127.0 0.1

play07:14

atau kita bisa menggunakan si localhost

play07:19

nah seperti ini lalu port-nya yang akan

play07:22

kita tuju yaitu port dari si Eta keur

play07:25

yaitu

play07:26

9999 lalu minus e-class Find Friends SH

play07:33

seperti ini nah perintah minus eye

play07:36

berfungsi untuk menjalankan perintah

play07:38

setelah koneksi terbuat dan

play07:41

inflasi SSH itu sendiri merupakan sel

play07:44

yang akan dijalankan dari si Eta keur

play07:48

dan dijalankan dari si selfoss itu

play07:52

sendiri

play07:53

nah disini

play07:55

chace enter nah nantinya koneksi yang

play08:00

terbuat dan di segi attacker disini

play08:04

merupakan sel dari sihost Nah bisa kita

play08:07

buktikan ketiak kita beri perintah PWD

play08:10

nah terlihat di sini directory ada pada

play08:14

direktori desktop yang dimana kita tahu

play08:17

bahwa desktop ini merupakan direktori

play08:20

dari sel host seperti itu Nah itu aja

play08:25

untuk materi kali ini selamat berjumpa

play08:27

di video berikutnya

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
CybersecurityBackdoorsReversalPHPScriptingHackingSecurityTutorialKali LinuxNetwork Attacks
¿Necesitas un resumen en inglés?