YoVDO

Linux Persistence Techniques - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Cybersecurity Courses

Course Description

Overview

Explore Linux persistence techniques in this comprehensive 55-minute video from the Hackersploit Red Team series. Learn about establishing and maintaining access to remote servers using backdoors and web shells. Discover various methods including SSH key persistence, creating privileged user accounts, configuring Unix shells, setting up web shells, and utilizing cronjobs. Gain insights into MITRE Attack persistence techniques and understand how to establish root access. Master essential skills for clearing command history and configuring Unix shells to maintain stealth. Ideal for cybersecurity professionals and red team practitioners looking to enhance their knowledge of Linux-based persistence strategies.

Syllabus

Introduction
What We’ll Be Covering
What is Persistence?
MITRE Attack Persistence Techniques
How to Establish Root Access
How to Establish Persistence with SSH Keys
How to Create a Privileged User Account
How to Clear Your Command History
How to Configure the Unix Shell
How to Set Up A Web Shell Backdoor
How to Setup Persistence via cronjobs
Conclusion


Taught by

Linode

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network