In this tutorial we are going to talk about some ways to maintaining access after penetration testing, it saves time and patches vulnerabilities.
Ways of maintaining access:
•Creating OS Backdoors
(using cymothoa to do cymothoa -s)
(using nc for in kali Linux so scan IP and port and maintain)
(weevly)
•Tunnel
•Web Based Backdoors