Setting up a persistent connection with backdoors

We started this book with a pre-exploitation technique where we focused on information gathering. Then, we moved ahead to the exploitation phase where we learned different ways of compromising the target. Then, we learned some useful post-exploitation techniques that can be implemented after compromising the target. Now, in this recipe we will learn the ever-exploitation technique in which we will try to establish a persistent connection with our target, so that we can connect to it at our will. As the attacker, or the target machine, cannot be always available, backdooring the target can be effective for setting persistent connections.

Getting ready

Meterpreter provides us with two scripts which ...

Get Metasploit Penetration Testing Cookbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.