Carleton University - School of Computer Science Honours Project
Fall 2020
Creating a Stealthy Backdoor
Matthew Talbot
SCS Honours Project Image
ABSTRACT
This report explores the methodology and implementation of how a malicious actor can compromise a computer. The techniques explored focus on creating a server in order to establish a reverse SSH connection and building out a custom rootkit to hide the server from detection. Another avenue that was explored shows how using social media platforms like Twitter can act as a trigger for malicious code. This has been achieved by monitoring live Tweets from the attacker in order to start the server when a specific message has been Tweeted.