![]() ![]() ![]() Nevertheless, hunting for persistence across an environment should be one of the top hunts that hunt teams should focus on.īefore we get into hunting for persistence in an environment, let’s first look at “what persistence is.” Persistence, especially amongst threat hunters, doesn’t often get the same level of attention as some of the more exotic tactics like privilege escalation, process hollowing, process doppelgänging, or DLL injection. Establishing a foothold can be difficult, so when adversaries get into an environment, they want to make sure they stay there.Įnter the topic of persistence. Afterall, its reported that only 4 percent of users click on phishing links and attachments. A core tenant for malware authors and threat actors is that persistence is key. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |