Ayo Secu

  • 홈
  • 태그
  • 방명록

persistence 1

Persistence

PersistenceIn the persistence phase of an attack, attackers establish methods to maintain access to a compromised system, even after reboots, log-offs, or security measures. Persistence techniques ensure that attackers can resume control without needing to re-exploit vulnerabilities, helping them stay in the system for extended periods. Here are some common persistence methods, including creatin..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

systems, Digital Forensics, os implementation, security, forensic, Detection, attack structure, incident management, identity, mitigations, Authentication, threat modeling, security terms, network, Cryptography, cybersecurity, Exploit, infrastructure virtualization, NETWORK SECURITY, web application,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바