This chapter will introduce step four of the hacking methodology, maintaining access of compromised systems. This includes taking preexisting sessions from the exploitation of computer system and web services to facilitate repeated access and further exploitation of a computer system and its attached network infrastructure.
Maintaining access; postexploitation; vulnerability; virus; Trojan; backdoor; malware; keyloggers; colocation; spyware; encoding; payloads; botnets; scripting; command and control
Information in This Chapter
Maintaining Access: Terminology and Core Concepts