Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The final step in the Hacker Methodology is maintaining access after it has been achieved. This is one of the more difficult steps in the methodology as many red flags can potentially be raised, which can turn the tables and have the victim pursuing the attacker by directing pings at them! An important step in not being discovered is the deletion of any artifacts left behind such as: - Scheduled services - Files - Any user accounts that were created - Logs