all InfoSec news
Linux Persistence Technique | Credential Harvesting | Unshadow
May 5, 2023, 10:42 a.m. | Mr Jokar
System Weakness - Medium systemweakness.com
🐶 But What is Persistence ?
The story starts when you successfully exploited a linux machine. You are either root or you have root permission to things all over the machine. Now your goal is to create a persistence so that even if you lose the shell, you don’t have do the whole exploitation again, you can just use your persistence method to get the shell right back again.
There are multiple methods to persist in a linux environment. like …
credential harvesting cybersecurity linux persistence red team
More from systemweakness.com / System Weakness - Medium
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Engineer II, Offensive Security Penetration Testing
@ Amazon.com | US, TX, Virtual Location - Texas
Cybersecurity Specialist (Security Engineering)
@ Triton AI Pte Ltd | Singapore, Singapore, Singapore
Information Systems Security Officer (ISSO)
@ ARA | Arlington, Virginia, United States
Lead - IT Risk compliance & Info Security
@ First Advantage | Bengaluru-560042, Karnataka
Embedded VSOC Analyst
@ Sibylline Ltd | Australia, Australia