forensicsmedium
PersistenceIsFutile
HackTheBox
Task: compromised Linux server with 8 backdoors (remote access + privilege escalation) to find and remove, then run verification script. Solution: systematic enumeration of SSH keys, crontabs, SUID binaries, shell RC files, MOTD scripts, and system users to identify and remediate all 8 persistence mechanisms.
$ ls tags/ techniques/
base64suidprivilege_escalationbackdoornetcatreverse_shellincident_responsepersistencelinux_forensicsssh_authorized_keyscrontabbind_shellbashrcmotddns_c2
backdoor_enumeration_and_removalsuid_binary_detection_via_md5cron_persistence_analysisbashrc_alias_backdoor_detectionmotd_script_analysisssh_key_persistence_removaldns_txt_c2_detectionpasswd_shadow_modification_detection
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]