Which stage of the cyber kill chain involves the attacker establishing a persistent presence within the target's environment to avoid detection and maintain access for future exploits?
Actions on Objectives
Reconnaissance
Command and Control (C2)
Establishment of persistence