In this chapter, we will cover the following topics:
- Pivoting and expanding access to the network
- Using persistence to maintain system access
- Using cymothoa to create a Linux backdoor
- Protocol spoofing using pingtunnel
- Protocol spoofing using httptunnel
- Hiding communications with cryptcat