What will a threat actor do to create a back door on a compromised target according to the Cyber Kill Chain model?
What will a threat actor do to create a back door on a compromised target according to the Cyber Kill Chain model? Collect and exfiltrate data. Add services and autorun…