Summary

In this chapter, you have seen five different ways to gain control and put in back-doors on Windows machines, from Ncat scripting, to metasploit meterpreter attacks, to adding a dropbox, to using Social-Engineering Toolkit for sending phishing e-mails, to using Backdoor Factory to create executables with shell-script backdoors.

In the next chapter, we will address reverse engineering of malware you collect, so you can understand what it is likely to do in the wild or in your network, and stress-testing your equipment.

Get Penetration Testing: A Survival Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.