Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
What is Persistence?
4
MITRE Attack Persistence Techniques
5
How to Establish Root Access
6
How to Establish Persistence with SSH Keys
7
How to Create a Privileged User Account
8
How to Clear Your Command History
9
How to Configure the Unix Shell
10
How to Set Up A Web Shell Backdoor
11
How to Setup Persistence via cronjobs
12
Conclusion
Description:
Explore Linux persistence techniques in this comprehensive 55-minute video from the Hackersploit Red Team series. Learn about establishing and maintaining access to remote servers using backdoors and web shells. Discover various methods including SSH key persistence, creating privileged user accounts, configuring Unix shells, setting up web shells, and utilizing cronjobs. Gain insights into MITRE Attack persistence techniques and understand how to establish root access. Master essential skills for clearing command history and configuring Unix shells to maintain stealth. Ideal for cybersecurity professionals and red team practitioners looking to enhance their knowledge of Linux-based persistence strategies.

Linux Persistence Techniques - Red Team Series

Linode
Add to list
0:00 / 0:00