Lab 17: Lateral Movement & Persistence
Objective
Background
Architecture
Time
Lab Instructions
Step 1: Setup — Start as Root (Post-Exploitation)
Step 2: Technique 1 — SSH Key Implantation
Step 3: Technique 2 — Hidden Backdoor User
Step 4: Technique 3 — Cron-Based Callback
Step 5: Technique 4 — .bashrc / PATH Hijacking
Step 6: Technique 5 — Web Shell (if web server exists)
Steps 7–8: Indicator of Compromise Detection + Cleanup
Remediation
Further Reading
Last updated
