From the course: Penetration Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Maintaining access

Maintaining access

- [Instructor] Maintaining access. This is the next phase in system hacking where an attacker has infiltrated the system, has gained access, and now they're maintaining access. So let's look at the steps involved here and some techniques and some other valuable information in this lesson. So after the exploitation and the privilege escalation, attackers can create a backdoor for later use. They want to make sure that they can get in their system when they need to. Now using this backdoor, an attacker can later access the system without any need for exploitation again. This is something that we spoke about in the previous lesson. So this backdoor, again, eliminates the need to go through the whole vulnerability exploitation again to gain access. Tools used for this process, or for maintaining access, is Metasploit Meterpeter Backdoor, PoshC2, rootkits, and Powersploit. But let's look at some other ways and other avenues as well as techniques and actions that an attacker would use. So…

Contents