Maintaining access is a key part of post exploitation and it refers to the ability of an attacker to maintain persistent access to a compromised system or network even after the initial compromise has been detected and possibly remediated.
Once an attacker gains access to a system, they may want to maintain access in order to continue to gather sensitive information, execute further attacks, or use the system as a staging ground for attacks on other systems. Maintaining access also helps an attacker to avoid having to go through the effort of compromising the system again in the future.
There are several ways that an attacker can maintain access to a compromised system or network. One common technique is to install a backdoor or rootkit, which is a type of malicious software that allows an attacker to access the system even after it has been secured. Another technique is to create a new user account with administrative privileges and hide it from the system administrator or security personnel.