Part 3: Total Immersion
This part of the book will focus on how to maintain access to a target; how to ensure that you can always go back in the form of a backdoor, a reverse shell, and so on; and how to clear your tracks. It will explain how to pivot, how to escalate privileges, and how to install various backdoors so that you can return to the system.
This part contains the following chapter:
- Chapter 7, Post-Exploitation