Viewing 4 posts - 1 through 4 (of 4 total)
  • Author
    Posts
  • #51386
    Avatarhanshacker
    Participant

    Hello,
    After changing a process to a less suspicious explorer process on the victims computer as described, is this persistant?
    Does this change remain eg after a restart of the victim’s computer?
    Thanks a lot for clarifying and helping me with this.
    Hans

    #51436
    diegodiego
    Moderator

    Hi!
    No, that will just persists for the current session, there’s a lecture about persistence but you’ll need to migrate to a less suspicious process anyway.
    Greetings!
    Diego

    #51442
    Avatarhanshacker
    Participant

    Many thanks!

    #51484
    diegodiego
    Moderator

    You’re welcome!

    Greetings!
    Diego

Viewing 4 posts - 1 through 4 (of 4 total)
  • You must be logged in to reply to this topic.