Search

Home

PNPT Studies

PJPT Studies

AD CS / Certificate Attacks (ESC1-15) (1, 8, 11 for now)

Report Writing / Client Presentation

Operationalizing Cybercrime Data (June 2025)

Maintaining Access (Persistence)

image

Typical as an ethical hacker, you won’t maintain access (the most you’ll do is add a user (bottom))

The first 3 create an open port that give you shell when you connect to them.

SUPER DANGERUS

Scheduled Task:

Will give you shell back every X amount of minutes