00 — Overview

Persistence & Backdoors

Getting in once isn't enough. Learn how attackers stay on machines across reboots and cleanups — cron backdoors, SSH key implants, SUID tricks, and systemd services.

Intermediate·45 min·6 tasks
// By the end of this module
Plant a cron job backdoor that survives a process kill
Implant an SSH authorised key for passwordless re-entry
Create a SUID binary that can be triggered later for privilege escalation
Hook /etc/profile and systemd units for persistent execution
// Prerequisites
Complete these before starting this module for the best experience.