Chapter 10

Maintaining Access

This chapter will introduce step four of the hacking methodology, maintaining access of compromised systems. This includes taking preexisting sessions from the exploitation of computer system and web services to facilitate repeated access and further exploitation of a computer system and its attached network infrastructure.

Keywords

Maintaining access; postexploitation; vulnerability; virus; Trojan; backdoor; malware; keyloggers; colocation; spyware; encoding; payloads; botnets; scripting; command and control

Information in This Chapter

ent Maintaining Access: Terminology and Core Concepts

 Backdoors

 Keyloggers

Chapter ...

Get Hacking with Kali now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.