Overview
Syllabus
Introduction
What We’ll Be Covering
What is Persistence?
Mitre Attack Techniques - Persistence
Empire Persistence Modules
Let’s Get Started
Recap of Some Starkiller Features
Renaming Agents
Unprivileged vs Privileged Agents
Creating a an Additional Privileged Agent
Beginning our Persistence Techniques
Using the Registry-Key Persistence Module
Using the Scheduled Tasks Persistence Module
Using the WMI Persistence Module
Using Local User Accounts as a Means of Persistence
Using the PowerBreach Module to create a Backdoor
Checking if our Agents are Pinging Back
Conclusion
Taught by
Linode