• Techniques to maintain access to compromised systems
  • Post-exploitation strategies