Maintaining persistence with the Metasploit framework