In the previous chapter, we exploited a target machine using the vulnerabilities found during the vulnerabilities-scanning process. However, the level of access you have when you exploit a system is dependent on the service you exploit. For example, if you exploit a vulnerability in a web application, you'll most likely have the same level of access of the account that runs that service; say, www data.
In this chapter, we'll escalate our access to the system and then implement ways to maintain our access to the compromised system, should we lose connection or need to return to it.