# Introduction In this lab, we will learn how to create a backdoor and clear traces after successfully gaining access to a target machine through a penetration attack. The scenario is set up in the LabEx environment, where we will use the Kali terminal to exploit vulnerabilities on the Metasploitable2 target machine, gain root access, create a backdoor for future access, and clear any traces left behind during the attack process.
Click the virtual machine below to start practicing