Kali Linux Registry
If Kali Linux has acquired a meterpreter shell of the victim's system, the shell supports a variety of attack commands, including system privilege escalation, keylogging, snapshots, registry, and processes. It supports the ability to manipulate the registry among attack commands, which is that the session breaks when the victim reboots, so if the backdoor is registered in the automatic registry,..