7. Post exploitation (persistence)

7.1 Persistence techniques (backdoor)

In this section, I outline the techniques to establish persistence on the device by creating a "backdoor" access to the system, that can be remotely accessed via the network.

For this experiment, we will make the following assumptions:

  1. Raspberry Pi: C2 server that is hosted somewhere on the internet

  2. Host machine: attacker machine that gains initial access, and uploads the "backdoor"

...

Last updated