00 — Overview
Persistence & Backdoors
Getting in once isn't enough. Learn how attackers stay on machines across reboots and cleanups — cron backdoors, SSH key implants, SUID tricks, and systemd services.
Intermediate·45 min·6 tasks
// By the end of this module
→Plant a cron job backdoor that survives a process kill
→Implant an SSH authorised key for passwordless re-entry
→Create a SUID binary that can be triggered later for privilege escalation
→Hook /etc/profile and systemd units for persistent execution
// Prerequisites
Complete these before starting this module for the best experience.