In this episode, we interview Mark (@Tech357) about his talk: I’m in, now what?: Recon and maintaining access in Linux system. Mark also discusses BSides Chicago’s New and Local track and the value of presentations that cover intermediate computer security skills.
Abstract: Pentesters going after Windows systems have the distinct advantage of using Meterpreter. They can install programs, clear logs, escalate privileges, to name a few. Unfortunately, there is no good Linux equivalent so we must do it all by hand. Attendees will learn how to map out the server and install a backdoor for later use. This talk will cover identifying key directories and files, noting additional services that may not have been immediately evident during initial Recon, using netcat combined with crontab to create a backdoor window, and selectively clearing logs. Some Linux / Minimal Pentesting experience required as this assumes you have already compromised the box.
Join us as we kick off BSides Detroit 13.