In this chapter, we took a journey into different strategies used by attackers to maintain access to the compromised environments to achieve a goal and also the final step of the kill-chain methodology. We learned different techniques to exfiltrate data through a variety of methods. We particularly focused on using Netcat, Meterpreter, scheduled tasks, Empire PowerShell, and Gmail to maintain persistence agents on the compromised systems, as well as the exfiltration of data using traditional services such as DNS, ICMP, Telnet, RDP, and Netcat. We also learned how to hide evidence of the attack in a traditional way to cover one's tracks and remain anonymous.
We hope this book has helped you to understand the fundamental risks, how attackers use these tools to compromise networks within a few seconds, how you can use the same tools and techniques to understand your...