Chapter 10

Maintaining Access

This chapter will introduce step four of the hacking methodology, maintaining access of compromised systems. This includes taking preexisting sessions from the exploitation of computer system and web services to facilitate repeated access and further exploitation of a computer system and its attached network infrastructure.

Keywords

Maintaining access; postexploitation; vulnerability; virus; Trojan; backdoor; malware; keyloggers; colocation; spyware; encoding; payloads; botnets; scripting; command and control

Information in This Chapter

ent Maintaining Access: Terminology and Core Concepts

 Backdoors

 Keyloggers

Chapter ...

Get Hacking with Kali now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.