Maintaining Access Attackers who choose to remain undetected remove evidence of their entry and use a back door or a Trojan to gain repeat access. This is a process known as maintaining access. Backdoor is when an attacker access the target machine without using normal authentication and also remain undetected. Tools used are: Cymothoa Meterpreter … Continue reading Week 11
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed