In this post i will be explaining what I learned on the eleventh week of the class session. In this weeks’ class session the topic discussed was on maintaining access. The topic discussed includes why we have to maintain access and how to maintain the access. Backdooring and tunneling were also discussed, their definitions and the types of backdooring. This includes OS backdoors and also web based backdoors, OS backdoors mentioned were Intersect and Meterpreter (Metasploit) backdoor. Tunneling examples were also given, which include dns2tcp, iodine, nc/netcat, proxychains, and also ptunnel. Web based backdooring works best when the target is a web based application. That was about all I learned in this eleventh session of the class.
Ethical Hacking Blog
This is a blog based on my progress on Ethical Hacking
Leave a Reply