Chapter 17. Maintaining Access and Clearing Tracks
In the previous chapter, we learned about privilege-escalation concepts along with practical escalation techniques.
In this chapter, we will be learning about maintaining access on a compromised system and cleaning up tracks using anti-forensic techniques. We will learn how to make persistent backdoors on the compromised system and use Metasploit's anti-forensic abilities to clear penetration trails.
We will cover the following topics in this chapter:
- Maintaining access
- Clearing tracks and trails
- Anti-forensics