When you initially compromise a target system, you have temporary access. Once the system reboots, that access is terminated. There are a number of techniques that can be used to maintain access. These span from tools and malware to using built-in system tools. Let's consider some of the various techniques that can be leveraged to maintain access.
Techniques used to maintain access
Backdoor
A backdoor enables easy access back into the compromised system. Trojans can be used for establishing backdoors. A trojan is a type of malware that's disguised as legitimate software, with the goal of dropping a malicious payload to enable remote access to the system. Trojans are capable of installing themselves as a service...