During a pentesting, you might want to have persistence on a machine for accessing the system, avoiding executing the original exploit used to gain access several times or to maintain a new session with higher privileges than you had at the beginning.

In this section, there are several techniques to keep persistence on a machine:

Last updated