Results 1 to 2 of 2

Thread: Maintaining a Really Stealth access once exploited – Best procedures?

  1. #1
    Just burned his ISO
    Join Date
    Dec 2010
    Posts
    4

    Lightbulb Maintaining a Really Stealth access once exploited – Best procedures?

    I’m checking pentesting on XP, Vista and 7 machines, x86 and x64.

    I have tried the meterpreter’s Metsvc…

    A mid-experienced sysadmin will soon discover an unknow process in the task manager, especially if not executed as SYSTEM.

    So I think I’m missing something That’s my question: which is the best “tool” with the following characteristics:

    1. Stealth - Must not be listed as an additional user process (Injection)
    2. Compatible - Must work on XP, Vista and 7 machines, x86 and x64
    3. Shell - Must provide at least a shell/prompt with SYSTEM privileges
    4. Reverse tcp – Must be a reverse connection
    5. Persistent - Must be persistent

    Maybe for a tool that once executed at startup instantly migrate to an already active SYSTEM process...

    I’m not looking for something user friendly, but for something solid and stable.

    Any suggestion?

  2. #2
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default Re: Maintaining a Really Stealth access once exploited – Best procedures?

    Covered in the metasploit unleashed guide from Offensive security and the metasploit video tutorial series on security tube .com website.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

Similar Threads

  1. Maintaining Remote Access - Metasploit
    By Kabil9 in forum Experts Forum
    Replies: 3
    Last Post: 12-20-2010, 09:07 AM
  2. Maintaining access?
    By s3arch in forum Beginners Forum
    Replies: 6
    Last Post: 01-23-2010, 02:03 AM
  3. Maintaining access through IP addresses
    By veget188 in forum OLD Newbie Area
    Replies: 4
    Last Post: 04-03-2009, 06:42 PM
  4. stealth after cracking and connecting
    By imported_slasher in forum OLD Wireless
    Replies: 23
    Last Post: 09-24-2008, 05:30 PM
  5. stealth option in next BT
    By r4w8173 in forum OLD BT3beta
    Replies: 5
    Last Post: 03-04-2008, 10:09 AM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •