Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Persistence with pwncat

via Pluralsight

Overview

During a red team engagement, it is crucial that you maintain foothold on your compromised servers. In this course, you will learn persistence using pwncat.

During a red team engagement, you need to access your targets for an extended period of time. The most common way of maintaining access is with persistence implants that allow you to access your victims at any time, even if the original point of entry is patched. In this course, Persistence with pwncat, you’ll learn how to utilize the pwncat framework to maintain foothold in a red team environment. First, you’ll explore the basics about persistence and how to install the pwncat framework. Next, you'll see how to receive a reverse shell and how to enumerate users using pwncat. Finally, you’ll learn how to deploy hidden SSH keys so you can access the victim server at any time. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques Persistence: Valid Accounts (T1078) and Discovery: Account Discovery (T1087) using pwncat. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Syllabus

  • Course Overview 1min
  • Persistence with pwncat 12mins
  • Resources 1min

Taught by

Ricardo Reimao

Reviews

Start your review of Persistence with pwncat

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.