Your Persistence Knowledge Kit
Thank you for downloading the Persistence Knowledge Kit. On this page, you will find all the contents of this kit—from explainer videos to technical deep dives. No matter what knowledge level you’re at, we have something to help you level up.
What Is Persistence?
Persistence is a tactic hackers use to discreetly maintain long-term access to systems. It’s similar to placing a piece of tape on the latch of a door to prevent it from locking; persistence provides easy re-entry should an attacker get caught or kicked off the machine.
In other words, once a hacker has gained initial access, persistence allows them to keep it—oftentimes without you knowing they have access in the first place. In this video, learn more about why persistence is an attacker’s safety net.
Persistence in the Modern Attack Chain
Persistence has quickly become a staple in the way adversaries attack and operate. Here’s a look at how hackers leverage persistence in their attack chain.
Goal: Gather as much information as they can to scope their attack.
02. Initial Access
Goal: Find a way in and compromise their target.
Goal: Maintain access without getting caught.
Persistence provides attackers with a longer shelf life after initial access. The longer a hacker can persist in an environment, the more intel they are able to gather—and ultimately, the more damage they can do.
Goal: Get a lay of the land and figure out the environment.
Goal: Make their malicious move.
Overstaying Their Welcome: How Hackers Persist in Your Environment
Persistence gives attackers the ability to maintain access to compromised systems, but it’s also an opportunity for detection. In this video, learn how hackers use persistence in their attacks and how defenders can protect against persistent threats.
To continue your persistence education, check out these helpful resources: