Explore real-world examples of persistent footholds established by attackers in this 56-minute conference talk from BSides Nashville 2016. Gain insights into the tactics, techniques, and procedures used by threat actors to maintain long-term access to compromised systems. Learn about various persistence mechanisms observed in actual incidents and understand how to detect and mitigate these advanced threats. Presenters Evan Pena and Chris Truncer share their expertise on identifying and countering sophisticated persistence methods employed by malicious actors in the wild.
Overview
Syllabus
R01 Ever Present Persistence Established Footholds Seen in the Wild Evan Pena Chris Truncer