Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson focuses on persistence mechanism, which is often the most difficult part of backdooring. It is important to pay attention to surroundings while gathering information to able to blend into the target environment. This lesson introduces the three main types of backdoors:
RDP: remote desk top protocol
Listening Shell: command line tool to listen for connections
New user: creating a new user account to keep accessing information.
Participants in this lesson will also learn a couple of ways to hide backdoors among normal data and obfuscate intent.