(Created page with "The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.") |
No edit summary |
||
Line 1: | Line 1: | ||
=Description= | |||
Persistence is a phase in the adversary's operations where the attacker seeks to maintain their foothold in a compromised system. This phase involves techniques used by the adversary to ensure that they retain access to the system even after restarts, changes in credentials, or other disruptions that could potentially cut off their access. The techniques used for persistence include any access, action, or configuration changes that allow the attacker to maintain their presence in the system, such as replacing or hijacking legitimate code or adding startup code. Persistence is critical to the adversary's operations, as it enables them to maintain their access to the compromised system and continue their malicious activities. The success of the persistence phase is vital in ensuring the longevity of the attacker's presence in the system and the achievement of their objectives. | |||
Latest revision as of 14:46, 29 January 2023
Description
Persistence is a phase in the adversary's operations where the attacker seeks to maintain their foothold in a compromised system. This phase involves techniques used by the adversary to ensure that they retain access to the system even after restarts, changes in credentials, or other disruptions that could potentially cut off their access. The techniques used for persistence include any access, action, or configuration changes that allow the attacker to maintain their presence in the system, such as replacing or hijacking legitimate code or adding startup code. Persistence is critical to the adversary's operations, as it enables them to maintain their access to the compromised system and continue their malicious activities. The success of the persistence phase is vital in ensuring the longevity of the attacker's presence in the system and the achievement of their objectives.