From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Staying under the radar
From the course: Ethical Hacking: System Hacking
Staying under the radar
- [Instructor] To maintain persistence while in a system, a malicious actor will use various tools and techniques. In this segment, we'll review methods to remain in a system undetected. After an attacker has gained initial access to a system, they'll perform further actions to gather information, escalate privileges, steal data, and install a backdoor to maintain persistent access. Let's talk about a few methods and techniques. One way is by abusing data protection API, which is a Windows API that provides services to encrypt and decrypt data, and is used by multiple applications to store credentials. Malicious actors extract keys or manipulate operations, to access or tamper with protected data. Now, they could also try Malicious Replication. Now, this involves replicating malicious content or objects across a network, virtual environment or system, to spread malware, compromise security, or achieve unauthorized access. Windows Management Instrumentation Event Subscriptions are used…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.