Attackers will install malware after gaining a footing to carry out additional activities like retaining access, persisting, and escalating privileges.
If you are unable to flee, cover up and hide. If you can, find a spot to hide where the assailant can't see you and create a strong barrier between you and the danger. Close curtains, lock doors, block doors, and turn out the lights. Remain silent.
An ethical hacking approach called "footprinting" is used to gather as much information as possible about a particular target computer system, an infrastructure, and networks in order to spot possibilities to breach them. It is among the greatest techniques for identifying weaknesses.
To know more about attackers visit:-
https://brainly.com/question/28232298
#SPJ4