Maintaining Access
Attackers who choose to remain undetected remove evidence of their entry and use a back door or a Trojan to gain repeat access. This is a process known as maintaining access.
Backdoor is when an attacker access the target machine without using normal authentication and also remain undetected.
Tools used are:
- Cymothoa
- Meterpreter
- Weevely
Leave a Reply