Windows Red Team Persistence Techniques - Red Team Series
Offered By: Linode via YouTube
Course Description
Overview
Explore advanced Windows Red Team persistence techniques in this comprehensive 43-minute video from the HackerSploit Red Team series. Learn about maintaining access across system restarts and credential changes, and dive into various persistence methods including registry key manipulation, scheduled tasks, WMI, local user accounts, and backdoor creation using PowerBreach. Gain practical insights on using Empire persistence modules, distinguishing between privileged and unprivileged agents, and verifying successful persistence. Master the art of maintaining a foothold in target systems and enhance your red team skills with hands-on demonstrations and expert guidance.
Syllabus
Introduction
What We’ll Be Covering
What is Persistence?
Mitre Attack Techniques - Persistence
Empire Persistence Modules
Let’s Get Started
Recap of Some Starkiller Features
Renaming Agents
Unprivileged vs Privileged Agents
Creating a an Additional Privileged Agent
Beginning our Persistence Techniques
Using the Registry-Key Persistence Module
Using the Scheduled Tasks Persistence Module
Using the WMI Persistence Module
Using Local User Accounts as a Means of Persistence
Using the PowerBreach Module to create a Backdoor
Checking if our Agents are Pinging Back
Conclusion
Taught by
Linode
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent