After all the steps of penetration testing, in this session we are taught how to maintain our access to the target. This step is necessary due to the fact that even though we know the steps or how to get pass to the system, by maintaining our access, we don’t actually need to redo all the steps we’ve done to access the system. There are several ways on how to maintain access, there are creating OS backdoors or web based backdoors, tunnel.

By creating backdoors we make ourselves to access the target without using normal authentication and remain undetected.

While tunneling is a way where we encapsulate one network protocol inside another network protocol in order to  bypass the protection that maybe exist in the target’s network.