YoVDO

Windows Red Team Persistence Techniques - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses

Course Description

Overview

Explore advanced Windows Red Team persistence techniques in this comprehensive 43-minute video from the HackerSploit Red Team series. Learn about maintaining access across system restarts and credential changes, and dive into various persistence methods including registry key manipulation, scheduled tasks, WMI, local user accounts, and backdoor creation using PowerBreach. Gain practical insights on using Empire persistence modules, distinguishing between privileged and unprivileged agents, and verifying successful persistence. Master the art of maintaining a foothold in target systems and enhance your red team skills with hands-on demonstrations and expert guidance.

Syllabus

Introduction
What We’ll Be Covering
What is Persistence?
Mitre Attack Techniques - Persistence
Empire Persistence Modules
Let’s Get Started
Recap of Some Starkiller Features
Renaming Agents
Unprivileged vs Privileged Agents
Creating a an Additional Privileged Agent
Beginning our Persistence Techniques
Using the Registry-Key Persistence Module
Using the Scheduled Tasks Persistence Module
Using the WMI Persistence Module
Using Local User Accounts as a Means of Persistence
Using the PowerBreach Module to create a Backdoor
Checking if our Agents are Pinging Back
Conclusion


Taught by

Linode

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX