0% found this document useful (0 votes)
110 views70 pages

DEFCON 22 Lance Buttars Nemus Intro To Backdooring OS

o
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views70 pages

DEFCON 22 Lance Buttars Nemus Intro To Backdooring OS

o
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70
An Introduction to Backdooring Operating Systems Lance Buttars Aka Nemus 1pler:ionk www.dc801.org www.introtobackdoors.com - Updated Slides Special Thanks to Natedmac Disclaimer The information provided in this presentation is to be used for educational purposes only. TMM Wacol) (m elem Lm Ty Talcoyeuitlacolam leen i (e(=10 All of the information is to develop a defense attitude in order to provided insight into possibilities. In no way should you use the information to cause any kind of damage directly or indirectly. Som Merle ly eer tal ela Colielm el mma a Contact a Lawyer if you have legal questions. What this presentation does NOT cover. How to hide your backdoor from skilled forensics Tete) oe How to clean up any logs or breadcrumbs you will leave behind. Any legal Issues you may encounter. This is not the best way to deploy a backdoor, but its good practice in understanding how backdoors work and what you can do with them.

You might also like