{"version":"1.0","provider_name":"\u6781\u7b80IT\uff5cSimpleIT","provider_url":"https:\/\/www.ruianding.com\/blog","author_name":"Ruian Ding","author_url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/","title":"ATT&CK for Enterprise - TA0003 Persistence - \u6781\u7b80IT\uff5cSimpleIT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2GYur9THIE\"><a href=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-persistence\/\">ATT&#038;CK for Enterprise &#8211; TA0003 Persistence<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-persistence\/embed\/#?secret=2GYur9THIE\" width=\"600\" height=\"338\" title=\"&#8220;ATT&#038;CK for Enterprise &#8211; TA0003 Persistence&#8221; &#8212; \u6781\u7b80IT\uff5cSimpleIT\" data-secret=\"2GYur9THIE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ruianding.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Persistence, Tactic TA0003 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Persistence&#8221; in cybersecurity refers to tactic employed by attackers to maintain unauthorized access to a compromised system, even in the face of potential disruptions like system restarts or credential changes. These techniques include altering or replacing legitimate code, adding malicious programs to startup processes, creating or compromising [&hellip;]"}