7. Post exploitation (persistence)
7.1 Persistence techniques (backdoor)
In this section, I outline the techniques to establish persistence on the device by creating a "backdoor" access to the system, that can be remotely accessed via the network.
For this experiment, we will make the following assumptions:
Raspberry Pi: C2 server that is hosted somewhere on the internet
Host machine: attacker machine that gains initial access, and uploads the "backdoor"
...
Last updated