Video Description

The final step in the Hacker Methodology is maintaining access after it has been achieved. This is one of the more difficult steps in the methodology as many red flags can potentially be raised, which can turn the tables and have the victim pursuing the attacker by directing pings at them! An important step in not being discovered is the deletion of any artifacts left behind such as: - Scheduled services - Files - Any user accounts that were created - Logs

Course Modules

Instructed By

Instructor Profile Image