Maintaining persistence with the Metasploit Framework