Cronjob Backdoors

05032019-cronjob-backdoors_blog-560x263.png

Cronjob Backdoors

Attackers commonly rely on backdoors to easily gain reentry and maintain control over a website. They also use PHP functions to further deepen the level of their backdoors.

A good example of this is the shell_exec function which allows plain shell commands to be run directly through the web application, providing attackers with an increased level of control over the environment.

Backdoor in Cron

While investigating a client with repeated website infections, we came across a scenario where a cron job was being used to reinfect the site.

Continue reading Cronjob Backdoors at Sucuri Blog.

 

This post was originally posted here

Share this page

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on email
sendinblue