Главная
Study mode:
on
1
Intro
2
Failure Point #1 in Userland Backdoors
3
Introduction to BACE (Cont.)
4
Quick Overview of chmod and setuid Mechanism
5
BACE + chmod, setuid = Backdoor via Metadata
6
Direct Command
7
Pros/Cons of this Method
8
Method #1 vs Traditional Rootshell Backdoor
9
Fun Fact: en is a cross-platform BACE!
10
Environment Variables
11
Hello setuid-wrapper.c
12
Spawning a Process
13
Demo of /usr/bin/python
14
Releasing The BACE Excel Sheet
15
Ideas for Detecting & Mitigating the Methods
16
Ideas for Future Methods
17
Acknowledgement
Description:
Explore a conference talk on backdooring techniques using metadata, presented at Circle City Con 5.0 in 2018. Delve into the intricacies of userland backdoors, focusing on the BACE (Binary-based Application Composition Engine) approach. Learn about chmod and setuid mechanisms, and how they can be combined with BACE to create backdoors via metadata. Compare this method to traditional rootshell backdoors, and discover the cross-platform capabilities of BACE. Examine environment variables, setuid-wrapper.c, and process spawning techniques. Gain insights into detecting and mitigating these methods, and explore potential future developments in this field.

Backdooring with Metadata

Add to list