Skip to content

Commit 0867379

Browse files
authored
Update index.md
* removed the link to the repo: https://github.com/ChristianPapathanasiou/apache-rootkit.git
1 parent df7ea0d commit 0867379

File tree

1 file changed

+2
-7
lines changed
  • docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits

1 file changed

+2
-7
lines changed

docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,6 @@ We can leverage the ability to load Apache2 modules to load our own rootkit modu
7979

8080
Command injection vulnerabilities allow attackers to execute arbitrary commands on the target operating system.
8181

82-
To achieve this, we will be using the apache-rootkit module that can be found here: https://github.com/ChristianPapathanasiou/apache-rootkit
83-
8482
Apache-rootkit is a malicious Apache module with rootkit functionality that can be loaded into an Apache2 configuration with ease and with minimal artifacts.
8583

8684
The following procedures outline the process of setting up the apache-rootkit module on a target Linux system:
@@ -97,10 +95,7 @@ The following procedures outline the process of setting up the apache-rootkit mo
9795

9896
cd /tmp
9997

100-
1. The next step will involve cloning the apache-rootkit repository on to the target system, this can be done by running the following command:
101-
102-
git clone https://github.com/ChristianPapathanasiou/apache-rootkit.git
103-
98+
1. The next step will involve cloning the apache-rootkit repository on to the target system.
10499
1. After cloning the repository you will need to navigate to the “apache-rootkit” directory:
105100

106101
cd apache-rootkit
@@ -215,4 +210,4 @@ Given that the target server is running the LAMP stack, we can create a PHP mete
215210

216211
![Meterpreter session receiving connection from Commix PHP backdoor](meterpreter-session-receiving-connection-from-commix-php-backdoor.png "Meterpreter session receiving connection from Commix PHP backdoor")
217212

218-
We have been able to successfully set up the apache-rootkit module and leverage the command injection functionality afforded by the module to execute arbitrary commands on the target system as well as upload a PHP backdoor that will provide you with a meterpreter session.
213+
We have been able to successfully set up the apache-rootkit module and leverage the command injection functionality afforded by the module to execute arbitrary commands on the target system as well as upload a PHP backdoor that will provide you with a meterpreter session.

0 commit comments

Comments
 (0)