NCAE Mapping Hub
Security+ ยท 2.0 Threats

Persistence

Techniques an attacker uses to maintain access to a compromised system across reboots, credential changes, and system updates. Common mechanisms: cron jobs, systemd services/timers, SSH authorized_keys, startup scripts, modified shell rcfiles.

How this shows up at NCAE

The competition image arrives pre-compromised. it is full of planted persistence mechanisms. Hunting them is a major first-hour task. NCAE's own YouTube videos 18-22 cover persistence in detail.