Adventure2024 Help

Anomaly 29 - Trivia 01

Which of the following is a technique used in post-exploitation to maintain persistent access to a compromised system without relying on traditional backdoors or implants?

c) Scheduled task creation - This is correct because it is not something traditional and has to be created by you

a) Kernel patching - This is incorrect because it would rely on a traditional backdoor

b) Rootkit installation - This is a tradiotnal method

d) DLL hijacking - Not known to create persistance

Last modified: 28 May 2024