Once you have obtained access to the target environment, you need to look at how you can maintain that access so that you are able to return. In a real-world attack, the attacker would create multiple backdoors or Command and Control (C2) channels so that access back into the compromised environment is easily attainable. In a penetration test, you would do the same.
In this chapter, you will learn that maintaining access is an important step of keeping control of the target system as an exploit you may have used can be patched, which ultimately removes your temporary remote access. You will learn about the various techniques and tools that can be used and will be able to skillfully use the tools described in this chapter to create persistent access to a target system.
As you progress through this chapter, you will learn about the following...