đŠč
CYBERSECURITY BOOK
Ctrl
K
Copy
đ§ââïž
ADVANCED PERSISTENT THREATS - RESEARCH
Establish persistence
The attacker expands their access and creates a "ghost network" to maintain access
Previous
Execution
Next
Escalate privileges
Was this helpful?