• Maintaining Access

    Attackers who choose to remain undetected remove evidence of their entry and use a back door or a Trojan to gain repeat access. This is a process known as maintaining access.

    Backdoor is when an attacker access the target machine without using normal authentication and also remain undetected.

    Tools used are:

    • Cymothoa
    • Meterpreter
    • Weevely

  • Privilege Escalation

    Privilege escalation happens when a malicious user exploits a bug, design flaw, or configuration error in an application or operating system to gain elevated access to resources that should normally be unavailable to that user. The attacker can then use the newly gained privileges to steal confidential data, run administrative commands or deploy malware – and potentially do serious damage to your operating system, server applications, organization, and reputation.

    One way to do this by attacking passwords.

    Two ways to attack passwords are :

    1. Online Attack – you can access the machine physically
    2. Offline Attack – from remote location

    Tools

    • Hydra
    • BruteSSH
    • Rainbowcrack
    • John The Ripper