In this chapter, we learned various techniques to make persistent access to a compromised target. We also learned various methods to clear traces from the compromised system along with some of the anti-forensic abilities of the Metasploit framework.
In the next chapter, we will learn about the importance of correct vulnerability scoring.