- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 53字
- 2021-06-24 19:12:47
Maintaining access
Mostly, the aim of a hacking attack is not only to get information using unauthorized access, but to also maintain that access. Every day, attackers are coming up with new ways to maintain access. The most well-known technique is hiding files from the system owner and users to avoid being caught.
推薦閱讀
- 電腦組裝與系統安裝
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Linux實戰
- Mastering Distributed Tracing
- Windows Phone 7.5 Data Cookbook
- 異質結原理與器件
- 移動應用UI設計模式(第2版)
- 嵌入式實時操作系統μC/OS原理與實踐
- 8051軟核處理器設計實戰
- OpenSolaris設備驅動原理與開發
- 鴻蒙HarmonyOS手機應用開發實戰
- bash shell腳本編程經典實例(第2版)
- Android NDK Beginner's Guide
- Java EE 8 High Performance
- 計算機系統平臺