Anomaly 29 - Trivia 01
Which of the following is a technique used in post-exploitation to maintain persistent access to a compromised system without relying on traditional backdoors or implants?
c) Scheduled task creation - This is correct because it is not something traditional and has to be created by you
a) Kernel patching - This is incorrect because it would rely on a traditional backdoor
b) Rootkit installation - This is a tradiotnal method
d) DLL hijacking - Not known to create persistance
Last modified: 28 May 2024