Search

Maintaining Access (Persistence)

image

Typical as an ethical hacker, you won’t maintain access (the most you’ll do is add a user (bottom))

The first 3 create an open port that give you shell when you connect to them.

SUPER DANGERUS

Scheduled Task:

Will give you shell back every X amount of minutes