Chapter 8. Maintaining Remote Access

Ever wonder how hackers are able to get into a secure network and be in the network for months and sometimes years without being caught? Well, these are some of the big tricks for staying inside once you are there. Not only will we discuss maintaining access to a local machine you have owned, but also how to use a Dropbox inside a network, and have it phone home.

In this chapter, we will be covering the following topics:

  • Using Netcat on a compromised Windows server
  • Putting a shared folder into a compromised server
  • Using Metasploit to set a malware agent
  • Using a Dropbox to trace a network
  • Defeating a NAC in two easy steps
  • Creating a spear-phishing e-mail with the Social Engineering Toolkit

Maintaining access

Persistent ...

Get Penetration Testing: A Survival Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.