In the previous chapter we talked about escalating the privilege to access the target machine. This chapter will conclude the penetration testing process by leaving the target machines open to get back access at any time.
In this chapter, we will discuss the following topics:
The main purpose of these tools is to help us maintain access, bypass the filters deployed on the target machine, or allow us to create a covert connection between our machine and the target. By maintaining this access, we don't need to do the whole penetration testing process again if we want to get back to the target machine at anytime.
Let's see several of the tools for maintaining ...