Week 11

Maintaining Access Attackers who choose to remain undetected remove evidence of their entry and use a back door or a Trojan to gain repeat access. This is a process known as maintaining access. Backdoor is when an attacker access the target machine without using normal authentication and also remain undetected. Tools used are: Cymothoa Meterpreter … Continue reading Week 11