In this chapter, you have seen five different ways to gain control and put in back-doors on Windows machines, from Ncat scripting, to Metasploit Meterpreter attacks, to adding a Drop Box, to using SET for sending phishing emails, and to using Backdoor Factory to create executables with shell-script backdoors.
In this chapter, we have also learned the set up and use of a Jump Box on various devices.
In the next chapter, we will address reverse-engineering malware you collect, so you can understand what it is likely to do in the wild or in your network, and stress-testing your equipment.