SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis talk will discuss the various ways that attackers try to maintain persistence on victim systems. Many are familiar with Run keys and scheduled tasks as ways attackers maintain persistence on Windows systems, but do you know where attackers hide on Linux?
題名:Linux環境における永続性メカニズム
概要:この講演では、攻撃者が攻撃対象のLinuxシステム上で永続性を確立するための様々な方法について説明します。Windowsシステムにおいて永続性を確立する方法として、Run/RunOnceレジストリキーやタスクスケジューラなどを悪用する手法が広く知られていますが、Linux上で攻撃者がどこに隠れているかをご存知ですか?
Jim has been in the IT since 1981. His expertise ranges from systems and database administration to security and research in parallel processing and distributed systems.
Read more about Jim Clausing