Edit This Page

Mobile Persist and Exfil

Once an attacker has compromised a mobile device, there are a variety of way in which they can persist on the device and exfiltrate sensitive data. This chapter will explore the different techniques in the following sections:

  • Mobile Persistence
  • Mobile Exfiltration