References; Chapter 6: Client-side Exploitation; What are client-side attacks?; Chapter 7: Post Exploitation; What is post exploitation?; Summary; References; Chapter 8: Post Exploitation - Privilege Escalation; Understanding Privilege Escalation; Summary; References; Chapter 9: Post Exploitation - Cleaning Up Traces; Disabling firewalls and other network defences; Summary; References; Chapter 10: Post Exploitation - Backdoors; What is a backdoor?; Payload tools; Creating an EXE backdoor; Creating a fully undetectable backdoor; Metasploit persistent backdoor; Summary; ReferencesIn this chapter we covered various techniques on how to make a backdoor executable for deployment on the victima#39;s system. We learned to bind the executable files to legitimate programs and make the victim execute them for us to get aanbsp;...
|Title||:||Learning Metasploit Exploitation and Development|
|Publisher||:||Packt Publishing Ltd - 2013-01-01|