🦹
CYBERSECURITY BOOK
Ask or search...
Ctrl + K
🧛♂️
ADVANCED PERSISTENT THREATS - RESEARCH
Establish persistence
The attacker expands their access and creates a "ghost network" to maintain access
Previous
Execution
Next
Escalate privileges
Was this helpful?