securityxxxpert

Binaries

4 posts in this topic

I was reading in one of my many network security books about when a attacker compromises the system they will upload binaries of there toolkits or custom compiled programs to the compromised system in order to further attack the network. My question is how is this done? What exactly are binaries and can any one provide me an example on how this is accomplished?

0

Share this post


Link to post
Share on other sites

I was reading in one of my many network security books about when a attacker compromises the system they will upload binaries of there toolkits or custom compiled programs to the compromised system in order to further attack the network. My question is how is this done? What exactly are binaries and can any one provide me an example on how this is accomplished?

This term is often misused, but I guess technically all files could be considered binary files since changes in the direction of magnetization represent data on the hard disk in patterns of binary data bits.

It appears they intend it to mean some sort of executable code.

EDIT: Results may vary on an SSD, LOL

Edited by heisenbug
0

Share this post


Link to post
Share on other sites

In that context, they mean that you will only see the compiled executable binary programs and not the ascii source code.

0

Share this post


Link to post
Share on other sites

related to security scenario.....uploading binaries is the post-eploitation phase ..binaries can be a backdoor,rootkit etc....

simple example of this is editing registry to run netcat on startup on a random port & spawn a command prompt, when someone connects to it.

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now