Adversaries may establish persistence through executing malicious commands triggered by a user’s shell.
Sub-technique of
T1546
See: MITRE ATT&CK
Adversaries may establish persistence through executing malicious commands triggered by a user’s shell.
Sub-technique of
T1546
See: MITRE ATT&CK