Ever wonder how hackers are able to get into a secure network and be in the network for months and sometimes years without being caught? Well, the following are some of the big tricks for staying inside once you are there. Not only will we discuss maintaining access for a local machine you have owned, but also how to use a Drop Box inside a network, and have it phone home.
We will cover the following topics in this chapter:
- Maintaining access, or ET Phone Home
- Maintaining access with Ncat
- The Drop Box
- Cracking the Network Access Controller (NAC)
- Creating a spear-phishing attack with the Social Engineering Toolkit
- Using Backdoor Factory to evade antivirus