Introduction

In this post, we covered the second part of Windows Persistence Techniques and specifically we covered Backdooring files as part of TryHackMe Windows Local Persistence

Another method of establishing persistence consists of tampering with some files we know the user interacts with regularly. By performing some modifications to such files, we can plant backdoors that will get executed whenever the user accesses them. Since we don’t want to create any alerts that could blow our cover, the files we alter must keep working for the user as expected.

While there are many opportunities to plant backdoors, we will check the most commonly used ones.

  • Executable Files
  • Shortcut Files
  • Hijacking File Associations
  • Startup Scripts

Get OSCP Certificate Notes

Room Answers

Insert flag5 here

Insert flag6 here

Video Walkthrough

Get Cyber Security Field Notes By Joining My YouTube Channel Membership

About the Author

Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.

View Articles