Watch this video on YouTube
Which of the following post-exploitation modules is used to maintain access to a compromised system over a longer period of time?