Staying Undetected Post Exploitation
Introduction Once you have control over a target and go into the post-exploitation phase, you start thinking on how to keep future access and most importantly how to stay undetected. This article will present some insight on the talk “The Listening” presented at Infiltrate 2011. For that presentation a Thunderbird backdoor was developed to allow remote control over the target box. This was recently added as part of the latest CANVAS release (July 2011)....