Maintaining access
Once a foothold is established (that is, remote access), it can be removed very quickly, as systems can be rebooted and users can log out. This is where persistent access comes in; it can be achieved in a number of ways. The best strategy for the maintenance of persistent access is to use multiple techniques simultaneously.
For example, one can plant a physical back door (Dropbox) into the network that can later be accessed within their wireless range. A more creative way is to set up a scheduled task on the compromised machine to run at boot and to execute periodically, for example once a day:
推薦閱讀
- Metasploit Penetration Testing Cookbook(Second Edition)
- 可信計(jì)算3.0工程初步
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- INSTANT Metasploit Starter
- 計(jì)算機(jī)使用安全與防護(hù)
- 反黑命令與攻防從新手到高手(微課超值版)
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- API攻防:Web API安全指南
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- SQL Injection Strategies
- VMware vCloud Security
- 云計(jì)算安全防護(hù)技術(shù)
- 交換機(jī)·路由器·防火墻(第2版)
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測與響應(yīng)