Summary
In this chapter, we took a journey into different strategies used by attackers to maintain access to the compromised environments to achieve a goal and also the last step of the kill-chain methodology. We learnt different techniques to exfiltrate data by various different methods. We particularly focused on using Netcat, Meterpreter, scheduled tasks, Empire PowerShell and Gmail to maintain persistence agents on the compromised systems and also exfiltration of data using traditional services such as DNS, ICMP, Telnet, RDP, and Netcat. We also learnt how to hide evidence of the attack in a traditional way to cover the tracks and remain anonymous.
We hope this book has helped you to understand the fundamental risks, how attackers use these tools to compromise networks within a few seconds, how you can use the same tools and techniques to understand your network vulnerabilities, and importance of remediation and patch management before your own network is compromised, having said that...