Infosec glossary entry


Living Of The Land

[…] intruders use legitimate software and functions available in the system to perform malicious actions on it.

Related entries

By jean-christoph

January 12, 2023

PrivEsc, red teaming
Leave a Reply

Your email address will not be published. Required fields are marked

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

this might interest you as well