Windows Red Team Persistence Techniques - Red Team Series

Windows Red Team Persistence Techniques - Red Team Series

Linode via YouTube Direct link

Using Local User Accounts as a Means of Persistence

15 of 18

15 of 18

Using Local User Accounts as a Means of Persistence

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Windows Red Team Persistence Techniques - Red Team Series

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What We’ll Be Covering
  3. 3 What is Persistence?
  4. 4 Mitre Attack Techniques - Persistence
  5. 5 Empire Persistence Modules
  6. 6 Let’s Get Started
  7. 7 Recap of Some Starkiller Features
  8. 8 Renaming Agents
  9. 9 Unprivileged vs Privileged Agents
  10. 10 Creating a an Additional Privileged Agent
  11. 11 Beginning our Persistence Techniques
  12. 12 Using the Registry-Key Persistence Module
  13. 13 Using the Scheduled Tasks Persistence Module
  14. 14 Using the WMI Persistence Module
  15. 15 Using Local User Accounts as a Means of Persistence
  16. 16 Using the PowerBreach Module to create a Backdoor
  17. 17 Checking if our Agents are Pinging Back
  18. 18 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.