Description:
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thanks I never thought of using netcat. I always stick with executables from Metasploit, encoded with Meterpreter. Then I use persistence to keep the backdoor open. If you want to see how, you can see how to make a Meterpeter executable.