Overview
This course on Linux Persistence Techniques covers methods for establishing and maintaining access to a remote server using back doors or web shells. The course teaches MITRE attack persistence techniques, establishing root access, setting up SSH keys for persistence, creating privileged user accounts, clearing command history, configuring the Unix shell, setting up web shells (backdoors), and establishing persistence via cronjobs. The teaching method is through a video tutorial. The course is intended for individuals interested in cybersecurity, red teaming, and Linux security practices.
Syllabus
Introduction
What We’ll Be Covering
What is Persistence?
MITRE Attack Persistence Techniques
How to Establish Root Access
How to Establish Persistence with SSH Keys
How to Create a Privileged User Account
How to Clear Your Command History
How to Configure the Unix Shell
How to Set Up A Web Shell Backdoor
How to Setup Persistence via cronjobs
Conclusion
Taught by
Linode