Adversaries may modify the SSH
authorized_keys
file to maintain persistence on a victim host.
Sub-technique of
T1098
See: MITRE ATT&CK
Adversaries may modify the SSH
authorized_keys
file to maintain persistence on a victim host.
Sub-technique of
T1098
See: MITRE ATT&CK