Chapter 8. Maintaining Remote Access
Ever wonder how hackers are able to get into a secure network and be in the network for months and sometimes years without being caught? Well, these are some of the big tricks for staying inside once you are there. Not only will we discuss maintaining access to a local machine you have owned, but also how to use a Dropbox inside a network, and have it phone home.
In this chapter, we will be covering the following topics:
Using Netcat on a compromised Windows server
Putting a shared folder into a compromised server
Using Metasploit to set a malware agent
Using a Dropbox to trace a network
Defeating a NAC in two easy steps
Creating a spear-phishing e-mail with the Social Engineering Toolkit