Skip to Main Content
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
book

Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition

by Vijay Kumar Velu
February 2022
Intermediate to advanced content levelIntermediate to advanced
572 pages
13h 16m
English
Packt Publishing
Content preview from Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition

13

Command and Control

Modern attackers are not interested in exploiting a system or network and then moving on. Instead, the goal is to attack and compromise a network of value and then remain resident on the network for as long as possible. Command and control (C2) refer to the mechanisms that testers use to replicate attacker actions by persisting on a system, maintaining two-way communication, enabling data to be exfiltrated to the tester’s location, and hiding the evidence of the attack.

In the command, control, and communication phase, the attacker relies on a persistent connection with the compromised system to ensure that they can continue to maintain their control.

In this chapter, you will learn about the following topics:

  • The importance ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Kali Linux for Advanced Penetration Testing - Third Edition

Mastering Kali Linux for Advanced Penetration Testing - Third Edition

Vijay Kumar Velu, Robert Beggs

Publisher Resources

ISBN: 9781801819770Supplemental Content