O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

In this recipe we will use persistence methods to maintain access to a system:

  1. Validate the IP addresses of your machines before we get started.
  2. We are going to start with an already exploited machine in Armitage, ensure it has elevated privileges.
We will be continuing with the preceding recipe if you need assistance with getting started. If you have not elevated your privileges please do so before continuing. If you are on XP, try using ms15_051_client_copy_image.
Armitage - main screen
  1. Right-click on the exploited host and select Meterpreter | Access | Persist:
Armitage - main screen
  1. Scroll through the options on the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required