Skip to Content
Penetration Testing Essentials
book

Penetration Testing Essentials

by Sean-Philip Oriyano
December 2016
Beginner
360 pages
9h
English
Sybex
Content preview from Penetration Testing Essentials

CHAPTER 9 Retaining Access with Backdoors and Malware

Once you have gained access to the system, the next step is carrying out the main part of your attack. This stage can involve running applications, modifying the system, or even jumping onto other systems as well as mapping and moving around the network. You’ll also need to retain access by installing backdoors and malware.

In this chapter, you’ll learn how to:

  • Pick an attack
  • Install a backdoor
  • Open a shell
  • Launch a virus, worms, and spyware
  • Insert Trojans
  • Install a rootkit

Deciding How to Attack

Once you have the opportunity to execute applications or do anything on the compromised system, the decision is up to you what you will do. Backdoors are meant to open up an alternative means ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

James Hayes, Nick Furneaux, Jims Marchang, Rob Ellis, Jason Charalambous, Moinuddin Zaki, Peter Taylor, Roderick Douglas, Felix Ryan, Ceri Charlton, Gemma Moore, Tylor Robinson, Sharif Gardner
Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781119235309Purchase Link