MITRE ATT&CK Persistence Collection Techniques Demonstrated on Cyberbit Range

preview_player
Показать описание
Attackers oftentimes establish persistence to either automate the tasks they want a machine to perform for them or to remain on the network and evade mitigation efforts from the Blue team. In the second video in our MITRE series, we dive into TA003 Persistence from the defenders point of view.
Рекомендации по теме