The problem with the back door, which we created in the previous chapter, is that if the attacker IP changes we don't have a built-in mechanism to inform our target that it should connect to the new IP address. In this chapter we will look into a method that lets you keep a fixed reserved name for your attacker machine even if its IP changes.
The following are the topics that will be covered in this chapter:
- Dynamic DNS
- Interacting with Twitter
- Replicating Metasploit's screen capturing
- Replicating Metasploit searching for content
- Integrating a low-level port scanner