Maintaining Access and Clearing Tracks

In the previous chapter, we learned about privilege-escalation concepts along with practical escalation techniques.

In this chapter, we will be learning about maintaining access on a compromised system and cleaning up tracks using anti-forensic techniques. We will learn how to make persistent backdoors on the compromised system and use Metasploit's anti-forensic abilities to clear penetration trails.

We will cover the following topics in this chapter:

  • Maintaining access
  • Clearing tracks and trails
  • Anti-forensics
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.152.242