YoVDO

Windows Red Team Persistence Techniques - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses

Course Description

Overview

Explore advanced Windows Red Team persistence techniques in this comprehensive 43-minute video from the HackerSploit Red Team series. Learn about maintaining access across system restarts and credential changes, and dive into various persistence methods including registry key manipulation, scheduled tasks, WMI, local user accounts, and backdoor creation using PowerBreach. Gain practical insights on using Empire persistence modules, distinguishing between privileged and unprivileged agents, and verifying successful persistence. Master the art of maintaining a foothold in target systems and enhance your red team skills with hands-on demonstrations and expert guidance.

Syllabus

Introduction
What We’ll Be Covering
What is Persistence?
Mitre Attack Techniques - Persistence
Empire Persistence Modules
Let’s Get Started
Recap of Some Starkiller Features
Renaming Agents
Unprivileged vs Privileged Agents
Creating a an Additional Privileged Agent
Beginning our Persistence Techniques
Using the Registry-Key Persistence Module
Using the Scheduled Tasks Persistence Module
Using the WMI Persistence Module
Using Local User Accounts as a Means of Persistence
Using the PowerBreach Module to create a Backdoor
Checking if our Agents are Pinging Back
Conclusion


Taught by

Linode

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent