Introducción

In this post, we presented Windows Persistence Techniques and specifically Account Tampering methods as part of TryHackMe Windows Local Persistence.

Having an administrator’s credential would be the easiest way to achieve persistence in a machine. However, to make it harder for the blue team to detect us, we can manipulate unprivileged users, which usually won’t be monitored as much as administrators, and grant them administrative privileges somehow

Notice that we assume you have already gained administrative access somehow and are trying to establish persistence from there.

Account Tampering Techniques

  • Assign Group Memberships
  • Special Privileges and Security Descriptors
  • RID Hijacking

Obtenga notas del certificado OSCP

Respuestas de la habitación

Insert flag1 here

Insert flag2 here

Insert flag3 here

Video Walk-Through

Obtenga notas de campo sobre seguridad cibernética uniéndose a la membresía de mi canal de YouTube