options to prolong an android/meterpreter/reverse_tcp knowing it will soon be removed from target device?
my coworker and i are having a lazy day and experimenting with metasploit, though we were curious about the fact that once we have an active session, what's to stop someone from adding another apk/exploit/persistence script? .. and what would be one of the most common setups if someone were to remove the original backdoor and you wanted to keep it active and that person unaware? would love to hear your thoughts.
[link] [comments]
from hacking: security in practice https://ift.tt/3zIwzrB
Comments
Post a Comment