Az - VMs Persistence

Reading time: 2 minutes

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks

VMs persistence

Kwa maelezo zaidi kuhusu VMs angalia:

Az - Virtual Machines & Network

Backdoor VM applications, VM Extensions & Images

Mshambuliaji anapotambua programu, nyongeza au picha zinazotumiwa mara kwa mara katika akaunti ya Azure, anaweza kuingiza msimbo wake katika programu na nyongeza za VM ili kila wakati zinapowekwa, backdoor inatekelezwa.

Backdoor Instances

Mshambuliaji anaweza kupata ufikiaji wa instances na kuzi-backdoor:

  • Kutumia rootkit ya jadi kwa mfano
  • Kuongeza funguo mpya za SSH za umma (angalia EC2 privesc options)
  • Ku-backdoor User Data

tip

Jifunze na fanya mazoezi ya AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE) Jifunze na fanya mazoezi ya Azure Hacking: HackTricks Training Azure Red Team Expert (AzRTE)

Support HackTricks