攻击者如何进行持久化以及如何查找-Linux部分
https://www.elastic.co/security-labs/primer-on-persistence-mechanisms
https://www.elastic.co/security-labs/primer-on-persistence-mechanisms