In this post, we presented Windows Persistence Techniques and specifically Account Tampering methods as part of TryHackMe Windows Local Persistence.
Having an administrator’s credential would be the easiest way to achieve persistence in a machine. However, to make it harder for the blue team to detect us, we can manipulate unprivileged users, which usually won’t be monitored as much as administrators, and grant them administrative privileges somehow
Notice that we assume you have already gained administrative access somehow and are trying to establish persistence from there.
Account Tampering Techniques
- Assign Group Memberships
- Special Privileges and Security Descriptors
- RID Hijacking
Insert flag2 here
Insert flag3 here