O'Reilly logo

Professional Penetration Testing by Thomas Wilhelm

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 13. Maintaining Access

Introduction

Частые гости наскучат. – Russian proverb: “A constant guest is never welcome.”
Once access has been achieved on a target system, we need to maintain that access. It is not uncommon for system maintenance windows to occur during the penetration test – if part of the scheduled maintenance is to patch the vulnerability we've exploited, our access might be terminated. Also, if a system is rebooted or we lose network connectivity, remote shell access may be permanently lost.
The use of backdoors is very common in a penetration test. There is often a need to find ways around defense obstacles, such as firewalls or access control lists. Backdoors can slip past all these defenses, giving ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required