The problem with the back door, which we created in the previous chapter, is that if the attacker IP changes we don't have a built-in mechanism to inform our target that it should connect to the new IP address. In this chapter we will look into a method that lets you keep a fixed reserved name for your attacker machine even if its IP changes.
The following are the topics that will be covered in this chapter:Â
- Dynamic DNS
 - Interacting with Twitter
 - Replicating Metasploit's screen capturing
 - Replicating Metasploit searching for content
 - Integrating a low-level port scanner