• Ethical Hacking 10.06.2020

    Maintaining Access

    Attackers who choose to remain undetected remove evidence of their entry and use a back door or a Trojan to gain repeat access. This is a process known as maintaining access.

    Backdoor is when an attacker access the target machine without using normal authentication and also remain undetected.

    Tools used are:

    • Cymothoa
    • Meterpreter
    • Weevely

    Posted by beauty27 @ 4:20 pm

  • Leave a Reply

    Your email address will not be published. Required fields are marked *