Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs

preview_player
Показать описание
In this video, I explore the process of establishing persistence on Linux via SSH keys, local accounts, web shells, and Cron Jobs.

Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

//PLATFORMS

//SOCIAL NETWORKS

//BOOKS

//SUPPORT THE CHANNEL

//CYBERTALK PODCAST

//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

-----------------------------------------------------------------------------------
#redteaming #cybersecurity #pentesting
Рекомендации по теме
Комментарии
Автор

Simplicity, patience, compassion.
These three are your greatest treasures.
Simple in actions and thoughts, you return to the source of being.
Patient with both friends and enemies,
you accord with the way things are.
Compassionate toward yourself,
you reconcile all beings in the world.

SuperUnknownNetwork
Автор

Alexis, u are the best teacher in CyberSec (I followed u on eJPTv2) and this Red Team course is wonderful, please continue to update it!

korovamilkplus
Автор

I love how this is secretly also a linux sysadmin lesson. user accounts, remote administration, scheduled behaviors, CLI focus

andrewferguson
Автор

Love your persistence Alexis. Keep up the good work!

CristiVladZ
Автор

you really should show up in ted i would love to see someone talking about this stuff its hard for me to find out good ppl on there

mandamiddle
Автор

Really appreciate the content man, been following your channel for a while and never been disappointed. Thank you for continuing to post! 💯

RetrKid
Автор

you just presented sth which I presented 5 years ago in one of my video, talking about the first technique -)
But Alas, People are missing Really Content, by not viewing the channel I made .

gaining SSH access without any password, is a video I have in my playlist

UmairAli
Автор

Hello, what terminal theme are you using?

zatoidarkchi
Автор

Hi Mate! Have you thought about creating a tutorial series for absolute beginners for linux. I mean, how to system is buildt and what are the command line commands and how they work, etc.

memy
Автор

Which os you use for hacking ? Kali, parrot os or other like ubantu.

sarveshkalwale
Автор

Hello can you do a tutorial on Osint bec ransom ware step by step.

godwinomaejalile
Автор

what is the them of the your kali linux sir

ShyamSundar-tgcj
Автор

Hi, can you make video siri of how to be come red team?

norsalam