Maintaining access
Once a foothold is established (that is, remote access), it can be removed very quickly, as systems can be rebooted and users can log out. This is where persistent access comes in; it can be achieved in a number of ways. The best strategy for the maintenance of persistent access is to use multiple techniques simultaneously.
For example, one can plant a physical back door (Dropbox) into the network that can later be accessed within their wireless range. A more creative way is to set up a scheduled task on the compromised machine to run at boot and to execute periodically, for example once a day:
推薦閱讀
- Getting Started with FortiGate
- 軟件開發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- Testing and Securing Android Studio Applications
- 模糊測試:強(qiáng)制發(fā)掘安全漏洞的利器
- Learning Devise for Rails
- 云原生安全技術(shù)實(shí)踐指南
- 華為防火墻實(shí)戰(zhàn)指南
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- SQL Injection Strategies
- 黑客攻防從入門到精通
- INSTANT Apple Configurator How-to
- 捍衛(wèi)隱私
- 5G網(wǎng)絡(luò)安全規(guī)劃與實(shí)踐
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- 數(shù)據(jù)安全實(shí)踐:能力體系、產(chǎn)品實(shí)現(xiàn)與解決方案