Video Description

This lesson focuses on persistence mechanism, which is often the most difficult part of backdooring. It is important to pay attention to surroundings while gathering information to able to blend into the target environment. This lesson introduces the three main types of backdoors:

  • RDP: remote desk top protocol
  • Listening Shell: command line tool to listen for connections
  • New user: creating a new user account to keep accessing information.

Participants in this lesson will also learn a couple of ways to hide backdoors among normal data and obfuscate intent.

Course Modules

Post Exploitation Hacking