In this chapter, we will cover the following recipes:
- Exploiting a Windows 10 machine
- Bypassing antivirus and IDS/IPS
- Metasploit macro exploits
- Human Interface Device attacks
- HTA attack
- Backdooring executables using a MITM attack
- Creating a Linux trojan
- Creating an Android backdoor