The VX-Files
The VX-Files
  • README.txt
  • For updates, questions, suggestions or just chatting: @malcrvz
  • Download your own local copy or check my other libre projects: Github/malcrvz
  • 📕Cybersecurity Theory
    • Index
      • Malware types
        • Viruses, worms and Trojans
        • Backdoors, Rootkits and Spyware
        • Botnets, DDoS and Spammer
        • Ransomware
        • Scareware and Adware/PUP/PUA
        • Downloaders and Launchers
        • Hacktool
        • APT - Advanced Persistent Threat
      • Social engineering techniques
        • Phishing
        • Pretexting
        • Baiting
        • Quid pro quo
        • Tailgating
      • Cryptography
        • Hash functions
        • Symmetric, Asymmetric and Hybrid cryptography
        • Digital signatures & Digital certificates
        • TLS Protocol
      • Pentesting methodology & Techniques
        • CIA Triad - Confidentiality, Integrity & Availability
        • The methodology steps
        • Pre-Engagement
        • Information Gathering
          • HTTP status codes
          • robots.txt
        • Vulnerability Assessment
        • Exploitation
          • Password cracking
        • Post-Exploitation & Persistence
          • Types of Shells
        • Privilege Escalation & Lateral Movement
        • Reporting & Remediation
  • 🐧Linux Essentials
    • Index
      • 1, 0, bits, Bytes: Units of digital information
      • User management
      • Packet management
      • Privileges & sudo
      • Passwd & Shadow files
      • Managing files, links and regex
      • find
      • Terminal/TTY
      • SSH
  • 🪟Windows Essentials
    • Index
      • CLI user management
      • CMD File management
  • 🌍Networking Essentials
    • Index
      • Windows CLI IP management
      • Linux IP management
      • Linux CLI Wi-Fi connection
  • 🕸️Network Pentesting
    • Tools
      • 1. Pre-Engagement
        • OpenVPN
      • 2. Information gathering
        • cURL & wget
        • Nmap
        • arp
        • Netcat
        • whatweb
      • 3. Vulnerability assessment
        • smbclient
      • 4. Exploitation
        • Metasploit
        • Hashcat
        • John the Ripper
      • 5. Post-Exploitation & Persistence
        • SSH
      • 6. Privilege escalation & Lateral movement
        • Possible privilege escalation vectors - Auto-enumeration scripts
      • 7. Reporting & Remediation
    • Techniques
      • Upgrade reverse shell to interactive
      • Transferring files to/from remote victim
      • Possible privilege escalation vectors - Manual checklist
    • Resources
      • Manufacturer default passwords lists
        • IP Cameras
      • Get Shells
  • 💉Web App pentesting
    • Tools
      • CeWL
      • Gobuster
      • whatweb
    • Techniques
      • Command injection
    • Resources
      • Reverse Shells
      • Bind Shells
  • 📡Wireless pentesting
    • Tools
    • Techniques
    • Resources
  • 🔓On-Premises Pentesting
    • Tools
    • Techniques
      • Removing Linux user passwords
      • Removing Windows user passwords
    • Resources
  • 💽Disks & Forensics
    • Index
      • Getting a disk ready
      • Inodes & Sectors
      • Recover deleted files
      • BUILDING - Secure file deletion
  • 🕷️Bash scripts
    • coming soon
  • ⚡PowerShell Scripts
    • coming soon
  • 🟩HTB Walkthroughs
    • coming soon
  • 🏴‍☠️External Resources
    • Schools
    • Books & Wikis
    • Utilities
    • Interactive cheat sheets
    • Wordlists
Powered by GitBook
On this page
  1. Cybersecurity Theory
  2. Index
  3. Malware types

Backdoors, Rootkits and Spyware

Stealthy ninjas in your disk!

Last updated 1 year ago

Backdoor

Code that, as the name suggests, opens a back door on the system for the attacker to bypass authentication procedures and grants remote access to the compromised system. Used as a persistence feature once the system is breached, "leaving the door in the back opened" or to give a that will enable the attacker to execute commands, upload/download data and facilitate other attacks. Can be deployed as a single command line or as a script that will stay on the system

Rootkit

Malware consisting in a collection of tools, a "kit", with the objective to stay hidden or even take control of the detection systems and grant administration privileges (root) and total remote control of the machine to the attacker. It usually takes the appearance of an OS file and remains undetected by modifying system files, intercepting system calls or using kernel-level hooks. Once inside it escalates privileges, grants a backdoor and gives remote control to the attacker. They are designed to attach at a very low level, so they will survive system reboots and remain installed for a long period of time.

Spyware

Malware specifically designed to collect information about the user/organization without their knowledge or consent. The specific functions of a spyware may vary and they can be very sophisticated, but the most popular ones include keylogging, tracking internet browsing, collecting search history, accessing personal files, monitoring email messages or even record the webcam/microphone of the victim.

Spyware is often distributed through or phishing emails with malicious links. Once installed it tries to operate covertly, avoiding detection to stay persistent and recollect as much data as possible. Once the criminal has enough data on the victim, he can then proceed to escalate the attack to black mailing, stealing money with stolen credentials, take full control of the system, impersonate the victim...

📕
remote shell
untrustworthy software downloads