Linux Red Team Persistence Techniques - SSH Keys, Web Shells and Cron Jobs
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore the process of establishing persistence on Linux systems through SSH keys, local accounts, web shells, and Cron Jobs in this informative video. Learn about various techniques adversaries use to maintain access across system restarts, credential changes, and other potential interruptions. Discover how attackers replace or hijack legitimate code, add startup code, and make configuration changes to keep their foothold on compromised systems. Gain insights into the concept of persistence in cybersecurity and understand its importance in red team operations and penetration testing.
Syllabus
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
Taught by
HackerSploit
Related Courses
Introduction to LinuxLinux Foundation via edX 操作系统原理(Operating Systems)
Peking University via Coursera Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera Information Security-3
Indian Institute of Technology Madras via Swayam Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera