- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 53字
- 2021-06-24 19:12:47
Maintaining access
Mostly, the aim of a hacking attack is not only to get information using unauthorized access, but to also maintain that access. Every day, attackers are coming up with new ways to maintain access. The most well-known technique is hiding files from the system owner and users to avoid being caught.
推薦閱讀
- 電腦組裝與系統安裝
- 阿里云數字新基建系列:云原生操作系統Kubernetes
- VMware Horizon View 6 Desktop Virtualization Cookbook
- 操作系統基礎與實踐:基于openEuler平臺
- Windows Phone 7.5 Data Cookbook
- 嵌入式應用程序設計綜合教程(微課版)
- Windows Server 2012網絡操作系統企業應用案例詳解
- 巧學活用Windows 7
- Linux系統安全基礎:二進制代碼安全性分析基礎與實踐
- Introduction to R for Quantitative Finance
- HTML5 Enterprise Application Development
- Linux軟件管理平臺設計與實現
- Windows Vista終極技巧金典
- Java EE 7 Developer Handbook
- Linux內核分析及應用