Linux Persistence Techniques | Red Team Series 10-13
In this video in our Hackersploit Red Team series, we will cover Linux Persistence Techniques. This is a method of establishing and maintaining access to a remote server using back door or web shell.
0:32 What We’ll Be Covering
1:07 What is Persistence?
2:10 MITRE Attack Persistence Techniques
3:02 How to Establish Root Access
3:56 How to Establish Persistence with SSH Keys
15:15 How to Create a Privileged User Account
25:40 How to Clear Your Command History
27:11 How to Configure the Unix Shell
32:27 How to Set Up A Web Shell (Backdoor)
43:08 How to Setup Persistence via cronjobs
New to Linode? Get started here with a $100 credit!
Read the doc for more information on Linux our Red Team Series.
Learn more about Linux Persistence Techniques.
Subscribe to get notified of new episodes as they come out.
#Linode #RedTeam #Security #Linux ; @HackerSploit
Linux Privilege Escalation Techniques | Red Team Series 9-13
You might also like…
Windows Red Team Credential Access Techniques | Red Team Series 6-12In this part of the HackerSploit Red Team series, we explore credential access techniques for stealing credentials, like users and passwords.
Recovering from a System Compromise | Top DocsIn this video, Jay showcases several methods of system recovery in the event your Linux system has been compromised by a third-party.
Intrusion Detection with Snort – Blue Team Series with HackersploitIn this second episode of our Blue Team series @HackerSploit introduces intrusion detection with Snort, a powerful intrusion detection app.
How to Secure SSH | Linux Security with HackerSploitIn this series, HackerSploit takes us through a scenario where we'll have to secure a WordPress instance from SSH based attacks.