Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Linux Red Team Persistence Techniques - SSH Keys, Web Shells and Cron Jobs

HackerSploit via YouTube

Overview

Explore the process of establishing persistence on Linux systems through SSH keys, local accounts, web shells, and Cron Jobs in this informative video. Learn about various techniques adversaries use to maintain access across system restarts, credential changes, and other potential interruptions. Discover how attackers replace or hijack legitimate code, add startup code, and make configuration changes to keep their foothold on compromised systems. Gain insights into the concept of persistence in cybersecurity and understand its importance in red team operations and penetration testing.

Syllabus

Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs

Taught by

HackerSploit

Reviews

Start your review of Linux Red Team Persistence Techniques - SSH Keys, Web Shells and Cron Jobs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.