Now that we have covered some of the techniques that can be used to maintain access, let's focus on some of the tools that are available. The first tool we will look at is the Metasploit Framework. The second tool we will cover is Empire.
Using tools for persistence
The Metasploit Framework
We have covered Metasploit extensively in this book, that is, when we used it during many phases of a penetration test. When it comes to persistence, Metasploit has modules in this area, too.
My target system is the Metasploitable 3 virtual machine. I exploited it using exploit/windows/smb/ms17_010_eternalblue.
Once the meterpreter session has been created, you can use the run persistence command to leverage the built-in persistence...