- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 108字
- 2021-06-24 18:19:08
Maintaining access
Once a foothold is established (that is, remote access), it can be removed very quickly, as systems can be rebooted and users can log out. This is where persistent access comes in; it can be achieved in a number of ways. The best strategy for the maintenance of persistent access is to use multiple techniques simultaneously.
For example, one can plant a physical back door (Dropbox) into the network that can later be accessed within their wireless range. A more creative way is to set up a scheduled task on the compromised machine to run at boot and to execute periodically, for example once a day:
推薦閱讀
- DevSecOps敏捷安全
- 黑客大曝光:無線網絡安全(原書第3版)
- 工業互聯網安全
- 工業控制網絡安全技術
- API攻防:Web API安全指南
- 網絡運維親歷記 (網絡運維紀實文學)
- CTF競賽權威指南(Pwn篇)
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- Building a Home Security System with BeagleBone
- 可信計算3.0工程初步(第二版)
- 網絡安全與攻防入門很輕松(實戰超值版)
- 從實踐中學習密碼安全與防護
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網絡服務安全與監控
- VMware vCloud Security