¨Force exploit code to spawn a
command shell and enter another command to be executed by
command shell
¨Shell
and command will run under the context of the vulnerable process
¨Installing
a backdoor using inetd
¨Backdooring
with TFTP and Netcat
¨Shooting
back an Xterm