After the intruder fully controls the system, it is a technology adopted for the next entry.
It is generally implemented by modifying system profiles and installing third-party back door tools. Has concealment, cany the system log, is not easy to be discovered by the system administrator.
Full text reading:
Linux back door technology and practice