- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 53字
- 2021-06-24 19:12:47
Maintaining access
Mostly, the aim of a hacking attack is not only to get information using unauthorized access, but to also maintain that access. Every day, attackers are coming up with new ways to maintain access. The most well-known technique is hiding files from the system owner and users to avoid being caught.
推薦閱讀
- Learning Windows Server Containers
- 精通Linux內核開發
- 精解Windows 8
- 操作系統基礎與實踐:基于openEuler平臺
- 嵌入式操作系統(Linux篇)(微課版)
- 異質結原理與器件
- Learning Bootstrap
- Kali Linux 2018:Windows Penetration Testing
- Windows 7應用入門與技巧
- OpenStack系統架構設計實戰
- Django Project Blueprints
- Hands-On UX Design for Developers
- 精解Windows 10
- Introduction to R for Quantitative Finance
- HTML5 Enterprise Application Development