From the course: Introduction to the MITRE ATT&CK Framework
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Persistence
From the course: Introduction to the MITRE ATT&CK Framework
Persistence
- [Instructor] The next tactic in MITRE framework is persistence. Persistence is a tactic that allow attackers to ensure continued access to the compromised system. This tactic consists of 19 techniques and 94 sub-techniques. Persistence ensures that hackers can continue to access the systems for extended periods. And don't lose access on account of system reboots, password changes termination of sessions, or any other such interruptions. Persistence involves modifying system behavior to enable consistent access. This can involve modifying system or device drivers, modifying registry settings, or tampering with the boot settings. Let's take a look at some examples. T1136 is one of the oldest trick in the book. Attackers compromise a server end user device, cloud console, or an application using a compromised user account. Then, they create additional users with the highest possible privileges to ensure they can access…