Setting up a persistent connection with backdoors
We started this book with a pre-exploitation technique where we focused on information gathering. Then, we moved ahead to the exploitation phase where we learned different ways of compromising the target. Then, we learned some useful post-exploitation techniques that can be implemented after compromising the target. Now, in this recipe we will learn the ever-exploitation technique in which we will try to establish a persistent connection with our target, so that we can connect to it at our will. As the attacker, or the target machine, cannot be always available, backdooring the target can be effective for setting persistent connections.
Meterpreter provides us with two scripts which ...