Maintaining Access
This chapter will introduce step four of the hacking methodology, maintaining access of compromised systems. This includes taking preexisting sessions from the exploitation of computer system and web services to facilitate repeated access and further exploitation of a computer system and its attached network infrastructure.
Keywords
Maintaining access; postexploitation; vulnerability; virus; Trojan; backdoor; malware; keyloggers; colocation; spyware; encoding; payloads; botnets; scripting; command and control
Information in This Chapter
Maintaining Access: Terminology and Core Concepts
Backdoors
Keyloggers
Chapter ...
Get Hacking with Kali now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.