Introduction

In this post, we presented Windows Persistence Techniques and specifically Account Tampering methods as part of TryHackMe Windows Local Persistence.

Having an administrator’s credential would be the easiest way to achieve persistence in a machine. However, to make it harder for the blue team to detect us, we can manipulate unprivileged users, which usually won’t be monitored as much as administrators, and grant them administrative privileges somehow

Notice that we assume you have already gained administrative access somehow and are trying to establish persistence from there.

Account Tampering Techniques

  • Assign Group Memberships
  • Special Privileges and Security Descriptors
  • RID Hijacking

Obtenir les notes du certificat OSCP

Réponses de la salle

Insert flag1 here

Insert flag2 here

Insert flag3 here

Video Walk-Through

Get Cyber Security Field Notes By Joining My YouTube Channel Membership

A propos de l'Auteur

Instructeur et nageur en cybersécurité

Voir les Articles