A penetration tester has gained access to a marketing employee's device. The penetration tester wants to ensure that if the access is discovered, control of the device can be regained. Which of the following actions should the penetration tester use to maintain persistence to the device? (Select TWO.)
mr_robot
Highly Voted 5 years agokloug
Most Recent 2 years, 2 months agomiabe
2 years, 9 months agoamericaman80
3 years, 11 months agoMOsama1
4 years agodyers
3 years, 12 months agoboyladdudeman
4 years, 1 month agoRedbyNight
4 years, 2 months agoqss88
4 years, 4 months agobigwilly69
4 years, 4 months ago[Removed]
4 years, 3 months agosomeguy1393
4 years, 4 months agokhuno
4 years, 9 months agoTheThreatGuy
4 years, 3 months ago