O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting up a persistent connection with backdoors

In this recipe we will learn the ever-exploitation technique, in which we will try to establish a persistent connection with our target, so that we can connect to it at our will. As the attacker, or the target machine, cannot be always available, backdooring the target can be effective for setting persistent connections.

Getting ready

Meterpreter provides us with two scripts which can perform the task of backdooring the target; they are Metsvc and Persistence. The working of both the scripts is similar. Let us deal with both of these scripts one by one.

Note

Both of these Meterpreter scripts create files on the target system so they can trigger alarms in the antivirus. So, it is recommended to kill ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required