Laboratory Exercise: 8 - Creating a Backdoor New!
This lab will demonstrate the use of various Tools, Techniques, and Procedures to create a backdoor on the target host that has already been exploited.
The student should have completed the previous seven labs in the Penetration Testing Using Kali Linux module: Reconnaissance, Enumeration, Vulnerability Scanning, Exploitation, Post-Exploitation, Exfiltration, and Password Cracking.
- Define backdoor
- Understand the tools and techniques used to create a backdoor
- Create a backdoor on a target system
IMPORTANT: This is the eighth of nine labs in the Penetration Testing Using Kali Linux module and should be completed in order. Each lab establishes the conditions for the next lab, so performing the labs out of sequence will cause problems for the students.
This lab is designed to use the Virginia Cyber Range, Cyber Basics (2018) Environment. If you don’t already have an instructor account on the range, request an account here.
Once the instructor has an account and a new course is created, the instructor should add the Cyber Basics (2018) environment, and then invite their students to be able to use it in the Virginia Cyber Range.
- K0070: Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- K0111: Knowledge of common network tools (e.g., ping, traceroute, nslookup) and interpret the information results.
- K0119: Knowledge of hacking methodologies in Windows or Unix/Linux environment.
- K0129: Knowledge of Unix command line (e.g., mkdir, mv, ls, passwd, grep).
- K0307: Knowledge of common network tools (e.g., ping, traceroute, nslookup).
- K0342: Knowledge of penetration testing principles, tools, and techniques.
- S0051: Skill in the use of penetration testing tools and techniques.
- A0055: Ability to operate common network tools (e.g., ping, traceroute, nslookup).
- Penetration Testing (PTT)