May 5, 2023, 10:42 a.m. | Mr Jokar

System Weakness - Medium systemweakness.com

🐶 But What is Persistence ?

The story starts when you successfully exploited a linux machine. You are either root or you have root permission to things all over the machine. Now your goal is to create a persistence so that even if you lose the shell, you don’t have do the whole exploitation again, you can just use your persistence method to get the shell right back again.

There are multiple methods to persist in a linux environment. like …

credential harvesting cybersecurity linux persistence red team

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer II, Offensive Security Penetration Testing

@ Amazon.com | US, TX, Virtual Location - Texas

Cybersecurity Specialist (Security Engineering)

@ Triton AI Pte Ltd | Singapore, Singapore, Singapore

Information Systems Security Officer (ISSO)

@ ARA | Arlington, Virginia, United States

Lead - IT Risk compliance & Info Security

@ First Advantage | Bengaluru-560042, Karnataka

Embedded VSOC Analyst

@ Sibylline Ltd | Australia, Australia