🔐
OffSec Wiki
search
⌘Ctrlk
🔐
OffSec Wiki
  • Tools
  • Information Gathering
  • Exploitation
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
  • Persistence
  • Powershell
  • RED Teaming
    • TryHackMe - Red Team Path
      • Red Team Fundamentals
      • Initial Access
      • Post Compromise
        • The Lay of the Land
        • Enumeration
        • Windows Privilege Escalation
        • Windows Local Persistence
        • Lateral Movement and Pivoting
        • Data Exfiltration
      • Host Evasions
      • Network Security Evasion
    • Resources
    • LOCKHEED MARTIN CHAIN
    • C2 Stuff
    • Tools
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. RED Teamingchevron-right
  2. TryHackMe - Red Team Pathchevron-right
  3. Post Compromise

Windows Local Persistence

LogoDomain Persistence – AdminSDHolderPenetration Testing Labchevron-right
Sneaky Active Directory Persistence TricksActive Directory & Azure AD/Entra ID Securitychevron-right

Introduction

Tampering with unprivileged accounts

Backdoring Files

Abusing Services

Abusing Scheduled Tasks

Logon Triggered Persistence

Backdoring the Login Screen / RDP

Persisting Through Existing Services

Logowebshell/fuzzdb-webshell/asp/cmdasp.aspx at master · tennc/webshellGitHubchevron-right

Conclusion

  • Hexacorn - Windows Persistencearrow-up-right

  • PayloadsAllTheThings - Windows Persistencearrow-up-right

  • Oddvar Moe - Windows Persistence Through RunOnceEx arrow-up-right

  • PowerUpSQLarrow-up-right

  • https://azeria-labs.com/persistence/arrow-up-right

PreviousWindows Privilege Escalationchevron-leftNextLateral Movement and Pivotingchevron-right

Last updated 2 years ago