16C: Maintain Persistence Flashcards
3.7 Given a scenario, perform post-exploitation techniques.
In cybersecurity, the ability of a threat actor to maintain covert access to a target host or network.
persistence
A mechanism for gaining access to a computer that bypasses or subverts the normal method of authentication.
backdoor
A class of malware that modifies system files, often at the kernel level, to conceal its presence.
rootkit
This occurs when the target system “binds” its shell to a local network port, and an attacker’s shell communicates with it.
bind shell
A maliciously spawned remote command shell where the victim host opens the connection to the attacking host.
reverse shell
A scheduled task that is managed by the Linux cron daemon.
cron job
Any instance of execution, such as the initiation of a process or running of a script, that the system performs on a set schedule.
scheduled task