zoukankan      html  css  js  c++  java
  • Penetration Test

    Persistence and Stealth

    PERSISTENCE
    • Scheduled jobs
      • Cron or Task Manager
    • Scheduled Task
      • Same as above
    • Daemons
      • Background processes or services
    • Back doors
      • Bypass standard security controls
    • Trojan
      • Malware that looks like it does something useful
    • New user creation
      • Makes later logins easier
    STEALTH
    • Clean up files, including tools installed
    • Hiding files that you need to leave
    • Sanitize log files (remove entries or entire logs)
    • Remove any traces of activity while accessing the environment

    DEMO

    ls	ls -l	ls -al
    

    image-20201103211826179

    Hide a file by adding a dot to the beginning.

    touch eric.txt
    mv eric.txt .eric.txt
    

    image-20201103212157820

    Easy to find the hidden file using ls -al or cat command.

    cat .bash_history
    
    QUICK REVIEW
    • Set up persistent processes to maintain a presence
    • Install low profile tools and malware to make your job easier
    • Leave artifacts that keep the attack going and make it easier to get back in
    • Once the attack is over, clean up to avoid post-mortem detection
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    第一次作业
    C语言I博客作业04
    C语言I博客作业05
    c语言l博客作业02
    C语言I博客作业06
    linux下递归删除目录下所有exe文件
    CSS高级
    CSS样式
    CSS框模型
    Oracle的用户、角色和权限
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13922686.html
Copyright © 2011-2022 走看看