Question

Describe how hackers maintain access in a system, the steps they follow and tools they use?

Describe how hackers maintain access in a system, the steps they follow and tools they use?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

The Concept of Maintaining Access

At the point when a system is undermined, the attacker is given transitory access to it (excluding traded off administration services, for example, SSH, telnet, and so on.). On the off chance that the system was to control cycle or the obtained entrance be hindered by certain methods, access would be lost. Be that as it may, if the fast move is made by the attacker upon beginning trade-off, access can be kept up or persistent.

This persistent access regularly appears as a backdoor, which begins alongside the system to give the attacker access without the requirement for additional exploitation. Propelling a high number of exploits trying to access a similar system is probably going to alarm an administrator (a great one in any event) and might bolt you out for good. Along these lines, persistent access is unquestionably the best approach.

Keeping up Access with Metasploit

Since we've talked about what precisely it intends to get persistent access, we can feel free to attempt it for ourselves. Fortunately, Metasploit comes prepared to take care of business. First, we'll access the injured individual PC, at that point we'll build up our persistent access. When that is completely done, we'll restart the unfortunate casualty PC and reconnect to the backdoor!

Maintaining Access with Trojan:


Here the attacker remotely installs the Trojan to the victim's machine and hides the trojan so that the victim doesn't notice it. Until the Trojan is installed, the attacker can maintain access to the system of the victim.

Rate the answer ( as much needed for me) if it helps else let me know your doubts. Thank you!!!

Add a comment
Know the answer?
Add Answer to:
Describe how hackers maintain access in a system, the steps they follow and tools they use?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT