- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 73字
- 2021-07-02 12:38:36
Maintaining access
Once the target system has been compromised, the penetration tester would attempt to create multiple instances of backdoor access in the event that they are no longer able to access the system via the exploit. Some penetration testers use this opportunity to implant Remote Access Trojans (RATs) or create a botnet to control the compromised systems.
The phase has the following objectives:
- Create and maintain remote access
- Hide files
- Steal data
推薦閱讀
- 云原生安全:攻防實踐與體系構建
- 工業(yè)互聯(lián)網(wǎng)安全
- 網(wǎng)絡空間安全:管理者讀物
- 網(wǎng)絡安全意識導論
- 反黑命令與攻防從新手到高手(微課超值版)
- Testing and Securing Android Studio Applications
- 信息安全案例教程:技術與應用(第2版)
- 網(wǎng)絡安全與攻防入門很輕松(實戰(zhàn)超值版)
- 編譯與反編譯技術實戰(zhàn)
- 黑客攻防從入門到精通
- Hands-On Artificial Intelligence for Cybersecurity
- Web安全攻防從入門到精通
- 計算機系統(tǒng)與網(wǎng)絡安全研究
- 云計算安全技術與應用
- CPK通向賽博安全之路:理論與實踐CPK Solution to Cyber Security:Theory and Practice