-
Book Overview & Buying
-
Table Of Contents
Kali Linux Cookbook - Third Edition
By :
In this chapter, you will explore the techniques and tools used to maintain long-term access to compromised systems. While gaining initial access is often the focus of many attacks, persistent access is what enables an intruder to extract value over time, evade detection, and survive system reboots or security interventions. Whether through creating hidden user accounts, planting malicious code that runs at startup, or establishing covert communication channels, persistence is a critical phase of the attack life cycle.
You will learn how to use system features to embed access. These techniques use standard administrative tasks but are executed with stealth in mind. You will also examine ways to communicate with compromised systems in ways that mimic normal traffic or encrypt payloads to hide from intrusion detection and prevention systems.
The following recipes will be covered in this chapter: