Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
What is Persistence?
4
Mitre Attack Techniques - Persistence
5
Empire Persistence Modules
6
Let’s Get Started
7
Recap of Some Starkiller Features
8
Renaming Agents
9
Unprivileged vs Privileged Agents
10
Creating a an Additional Privileged Agent
11
Beginning our Persistence Techniques
12
Using the Registry-Key Persistence Module
13
Using the Scheduled Tasks Persistence Module
14
Using the WMI Persistence Module
15
Using Local User Accounts as a Means of Persistence
16
Using the PowerBreach Module to create a Backdoor
17
Checking if our Agents are Pinging Back
18
Conclusion
Description:
Explore advanced Windows Red Team persistence techniques in this comprehensive 43-minute video from the HackerSploit Red Team series. Learn about maintaining access across system restarts and credential changes, and dive into various persistence methods including registry key manipulation, scheduled tasks, WMI, local user accounts, and backdoor creation using PowerBreach. Gain practical insights on using Empire persistence modules, distinguishing between privileged and unprivileged agents, and verifying successful persistence. Master the art of maintaining a foothold in target systems and enhance your red team skills with hands-on demonstrations and expert guidance.

Windows Red Team Persistence Techniques - Red Team Series

Linode
Add to list
0:00 / 0:00