Introduction

In this post, we presented Windows Persistence Techniques and specifically Account Tampering methods as part of TryHackMe Windows Local Persistence.

Having an administrator’s credential would be the easiest way to achieve persistence in a machine. However, to make it harder for the blue team to detect us, we can manipulate unprivileged users, which usually won’t be monitored as much as administrators, and grant them administrative privileges somehow

Notice that we assume you have already gained administrative access somehow and are trying to establish persistence from there.

Account Tampering Techniques

  • Assign Group Memberships
  • Special Privileges and Security Descriptors
  • RID Hijacking

Get OSCP Certificate Notes

Room Answers

Insert flag1 here

Insert flag2 here

Insert flag3 here

Video Walk-Through

Get Cyber Security Field Notes By Joining My YouTube Channel Membership

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles