In this recipe we will learn the ever-exploitation technique, in which we will try to establish a persistent connection with our target, so that we can connect to it at our will. As the attacker, or the target machine, cannot be always available, backdooring the target can be effective for setting persistent connections.
Meterpreter provides us with two scripts which can perform the task of backdooring the target; they are
Persistence. The working of both the scripts is similar. Let us deal with both of these scripts one by one.
Both of these Meterpreter scripts create files on the target system so they can trigger alarms in the antivirus. So, it is recommended to kill ...