Glitch effect

The Persistence Knowledge Kit

Are hackers hiding in your network? Download our Persistence Knowledge Kit to access a collection of resources to help you learn about persistence and why it’s a hacker favorite.

Download Your

Success Kit

Watch the Webinar

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Glitch effectGlitch effect

Persistence has become a staple in the modern hacker’s playbook. It’s one of today’s more stealthy attacker techniques—and one that defenders often overlook.

But understanding persistence isn’t just for l33t h4x0rs. With the right knowledge, you can learn how to catch hackers who are hiding in plain sight and beat them at their own game.

In our Persistence Knowledge Kit, we’ve curated a collection of resources to help you better understand persistence and why it’s a hacker favorite. Submit the form and instantly gain access to:

  • Easy-to-digest educational materials
  • A library of video content for your viewing pleasure
  • Additional reading and resources to round out your persistence knowledge

Your Persistence Knowledge Kit

Thank you for downloading the Persistence Knowledge Kit. On this page, you will find all the contents of this kit—from explainer videos to technical deep dives. No matter what knowledge level you’re at, we have something to help you level up.

What Is Persistence?

Persistence is a tactic hackers use to discreetly maintain long-term access to systems. It’s similar to placing a piece of tape on the latch of a door to prevent it from locking; persistence provides easy re-entry should an attacker get caught or kicked off the machine.

In other words, once a hacker has gained initial access, persistence allows them to keep it—oftentimes without you knowing they have access in the first place. In this video, learn more about why persistence is an attacker’s safety net.

Persistence in the Modern Attack Chain

Persistence has quickly become a staple in the way adversaries attack and operate. Here’s a look at how hackers leverage persistence in their attack chain.

01. Reconnaissance

Goal: Gather as much information as they can to scope their attack.

02. Initial Access

Goal: Find a way in and compromise their target.

03. Persistence

Goal: Maintain access without getting caught.

Persistence provides attackers with a longer shelf life after initial access. The longer a hacker can persist in an environment, the more intel they are able to gather—and ultimately, the more damage they can do.

04. Discovery

Goal: Get a lay of the land and figure out the environment.

05. Execution

Goal: Make their malicious move.

Overstaying Their Welcome: How Hackers Persist in Your Environment

Persistence gives attackers the ability to maintain access to compromised systems, but it’s also an opportunity for detection. In this video, learn how hackers use persistence in their attacks and how defenders can protect against persistent threats.

Additional Resources

To continue your persistence education, check out these helpful resources:

No items found.

The Persistence Knowledge Kit

Glitch effectGlitch effectGlitch effect
Share

Your Persistence Knowledge Kit

Thank you for downloading the Persistence Knowledge Kit. On this page, you will find all the contents of this kit—from explainer videos to technical deep dives. No matter what knowledge level you’re at, we have something to help you level up.

What Is Persistence?

Persistence is a tactic hackers use to discreetly maintain long-term access to systems. It’s similar to placing a piece of tape on the latch of a door to prevent it from locking; persistence provides easy re-entry should an attacker get caught or kicked off the machine.

In other words, once a hacker has gained initial access, persistence allows them to keep it—oftentimes without you knowing they have access in the first place. In this video, learn more about why persistence is an attacker’s safety net.

Persistence in the Modern Attack Chain

Persistence has quickly become a staple in the way adversaries attack and operate. Here’s a look at how hackers leverage persistence in their attack chain.

01. Reconnaissance

Goal: Gather as much information as they can to scope their attack.

02. Initial Access

Goal: Find a way in and compromise their target.

03. Persistence

Goal: Maintain access without getting caught.

Persistence provides attackers with a longer shelf life after initial access. The longer a hacker can persist in an environment, the more intel they are able to gather—and ultimately, the more damage they can do.

04. Discovery

Goal: Get a lay of the land and figure out the environment.

05. Execution

Goal: Make their malicious move.

Overstaying Their Welcome: How Hackers Persist in Your Environment

Persistence gives attackers the ability to maintain access to compromised systems, but it’s also an opportunity for detection. In this video, learn how hackers use persistence in their attacks and how defenders can protect against persistent threats.

Additional Resources

To continue your persistence education, check out these helpful resources:

Blurry glitch effect