This chapter brings in a variety of techniques that will mostly be used by law enforcement agencies. The methods discussed in this chapter will extend the usage of Metasploit to surveillance and offensive cyber operations. Throughout this chapter, we will look at:
- Procedures for maintaining anonymity
- Using obfuscation in payloads
- Achieving persistence with APT techniques
- Harvesting files from the target
- The power of Python in Metasploit