Understand and simulate long-term access to systems through privilege escalation and backdoor techniques
Persistence is the practice of establishing long-term access to a target network or device, often used in penetration testing to simulate malicious behavior of advanced threats
Establishing persistence is like leaving a hidden key under the doormat for later entry
crontab -l 00 * * * * /path/to/payload.sh
Create periodic execution for persistence
Registry persistence mechanism
Key generation
auditd -i