How to do it...

In this recipe we will use persistence methods to maintain access to a system:

  1. Validate the IP addresses of your machines before we get started.
  2. We are going to start with an already exploited machine in Armitage, ensure it has elevated privileges.
We will be continuing with the preceding recipe if you need assistance with getting started. If you have not elevated your privileges please do so before continuing. If you are on XP, try using ms15_051_client_copy_image.
Armitage - main screen
  1. Right-click on the exploited host and select Meterpreter | Access | Persist:
Armitage - main screen
  1. Scroll through the options on the ...

Get Kali Linux Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.