News Register Control Panel Private Messages Members List Team Search News Posts About Us
 

Back Channeling using Xterm
  Author: Ravish Ahuja
Added: 12/21/2002
Type: Tutorial
Viewed: 15418 time(s)
Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10Average visitor rating of 9.3/10
Intoduction

An attacker can get a shell if if you just only have a single service running on the server at port 80 i.e. HTTPD. Now, In this scenario a single vulnerability in the server that allows an attacker to execute a command is sufficient for an intelligent hacker to gain interactive shell access.
Lets say if the target server is running a script called PHF or any other script or program that allows an attacker to execute commands. So, in this tutorial we are considering that the target server is running PHF script that used to come default with the older versions of Apache web server, and UNIX X Windows system. X is a windowing facility that allows many different programs to share a graphical display which is extremely robust and allows X based client programs to display their output to the local X server or to a remote X server running on ports 6000-6003.

Article Pages:  1 | 2 | 3 | 4 | Next �  


How would you rate this article:    Bad Good   Go � 


� Copyright Linux Advisory 2003. All rights reserved.
We are not responsible for the comment and story contributed by users.