# Section 03: Maintaining Access

## Maintaining Access

Backdoor

> A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).

Keylogger / Keystroke logger

> Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard,\[1]\[2] typically covertly, so that a person using the keyboard is unaware that their actions are being monitored.

Spyware

> Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security.

Rootkit

> A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

Steganography

> Steganography (/ˌstɛɡəˈnɒɡrəfi/ (listen) STEG-ə-NOG-rə-fee) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection.

Links

* <https://en.wikipedia.org/wiki/Backdoor_(computing)>
* <https://en.wikipedia.org/wiki/Keystroke_logging>
* <https://en.wikipedia.org/wiki/Spyware>
* <https://en.wikipedia.org/wiki/Rootkit>
* <https://en.wikipedia.org/wiki/Steganography>
