December 2017
Intermediate to advanced
860 pages
16h 1m
English
In this example, we have already gained meterpreter access to a system running Windows Server 2012 R2. Let's move the meterpreter to the background using the background command and use the latest persistence module, which is post/windows/manage/persistence_exe. The beauty of this module is that it is not Metasploit dependent, which means that you can use any executable to achieve persistence on it. Let's put it to use and run a quick show options to check all the options we need to set, as shown in the following screen:

We can see that we have four options. REXENAME is the name of the .exe ...
Read now
Unlock full access