YoVDO

Linux Red Team Persistence Techniques - SSH Keys, Web Shells and Cron Jobs

Offered By: HackerSploit via YouTube

Tags

Red Team Courses Cybersecurity Courses Linux Courses Penetration Testing Courses

Course Description

Overview

Explore the process of establishing persistence on Linux systems through SSH keys, local accounts, web shells, and Cron Jobs in this informative video. Learn about various techniques adversaries use to maintain access across system restarts, credential changes, and other potential interruptions. Discover how attackers replace or hijack legitimate code, add startup code, and make configuration changes to keep their foothold on compromised systems. Gain insights into the concept of persistence in cybersecurity and understand its importance in red team operations and penetration testing.

Syllabus

Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs


Taught by

HackerSploit

Related Courses

The RedTeam Blueprint - A Unique Guide To Ethical Hacking
Udemy
Red Team Ethical Hacking - Beginner
Udemy
Active Directory Pentesting Full Course - Red Team Hacking
Udemy
Active Directory Pentesting With Kali Linux - Red Team
Udemy
Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight