O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Maintaining Access

In this chapter, we will cover the following topics:

  • Pivoting and expanding access to the network
  • Using persistence to maintain system access
  • Using cymothoa to create a Linux backdoor
  • Protocol spoofing using pingtunnel
  • Protocol spoofing using httptunnel
  • Hiding communications with cryptcat

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required