April 2018
Intermediate to advanced
176 pages
4h 16m
English
The problem with the back door, which we created in the previous chapter, is that if the attacker IP changes we don't have a built-in mechanism to inform our target that it should connect to the new IP address. In this chapter we will look into a method that lets you keep a fixed reserved name for your attacker machine even if its IP changes.
The following are the topics that will be covered in this chapter: