Windows Red Team Persistence Techniques - Red Team Series
Offered By: Linode via YouTube
Course Description
Overview
Explore advanced Windows Red Team persistence techniques in this comprehensive 43-minute video from the HackerSploit Red Team series. Learn about maintaining access across system restarts and credential changes, and dive into various persistence methods including registry key manipulation, scheduled tasks, WMI, local user accounts, and backdoor creation using PowerBreach. Gain practical insights on using Empire persistence modules, distinguishing between privileged and unprivileged agents, and verifying successful persistence. Master the art of maintaining a foothold in target systems and enhance your red team skills with hands-on demonstrations and expert guidance.
Syllabus
Introduction
What We’ll Be Covering
What is Persistence?
Mitre Attack Techniques - Persistence
Empire Persistence Modules
Let’s Get Started
Recap of Some Starkiller Features
Renaming Agents
Unprivileged vs Privileged Agents
Creating a an Additional Privileged Agent
Beginning our Persistence Techniques
Using the Registry-Key Persistence Module
Using the Scheduled Tasks Persistence Module
Using the WMI Persistence Module
Using Local User Accounts as a Means of Persistence
Using the PowerBreach Module to create a Backdoor
Checking if our Agents are Pinging Back
Conclusion
Taught by
Linode
Related Courses
The RedTeam Blueprint - A Unique Guide To Ethical HackingUdemy Red Team Ethical Hacking - Beginner
Udemy Active Directory Pentesting Full Course - Red Team Hacking
Udemy Active Directory Pentesting With Kali Linux - Red Team
Udemy Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight