Free Standard International Shipping for orders over £50
Order by 19th December for UK delivery before Christmas
0 Cart
Added to Cart
    You have items in your cart
    You have 1 item in your cart
    Total
    Check Out Continue Shopping

    A Guide To Recognising Backdoors using Metasploitable 2

    A Guide To Recognising Backdoors using Metasploitable 2

    Every now and again when pentesting you come across something that doesn't quite seem right. You can't always put your finger on it, it's just a little... off. Whether it's a code execution bug that's a little too easy to exploit, or the demo user account that looks like someone forgot to remove, sometimes vulnerabilities just seem as though they were deliberately placed there, even if it's for legitimate purposes. These bugs are commonly known as backdoors, and in this post I'll go through the steps in detecting some common types of backdoor from the network.

    Read more